Static task
static1
Behavioral task
behavioral1
Sample
ae740fb5a17e6633e1788175b1d19accbd60852ab0023bcc1e92ee002c9a8753.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae740fb5a17e6633e1788175b1d19accbd60852ab0023bcc1e92ee002c9a8753.exe
Resource
win10v2004-20221111-en
General
-
Target
ae740fb5a17e6633e1788175b1d19accbd60852ab0023bcc1e92ee002c9a8753
-
Size
36KB
-
MD5
ee4fb2eff2d4f37191371eb1542e33a0
-
SHA1
2bacae796d6436346eb38c341444b7c9abea2e44
-
SHA256
ae740fb5a17e6633e1788175b1d19accbd60852ab0023bcc1e92ee002c9a8753
-
SHA512
cbb68c9c64bd4bc1b3252119b5c64253a465a576914360068db5253ec695835240af16ce4d9714c652582e7814633bbe37e699a0f7dabb5aa39dddf44b461374
-
SSDEEP
384:6GKlj0U1q3GeDWEHH2hS4wkkG3OiJFErb/:6Xl0U2W8Wcbkhsr
Malware Config
Signatures
Files
-
ae740fb5a17e6633e1788175b1d19accbd60852ab0023bcc1e92ee002c9a8753.exe windows x86
8044275f255e180f3632b10d80ae3505
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaFreeVar
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaObjVar
DllFunctionCall
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
rtcCreateObject2
__vbaFPException
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ThunRTMain
__vbaLateMemCall
__vbaStrToAnsi
_CIatan
__vbaStrMove
_allmul
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
BASIC_CLASS_QueryInterface
BASIC_CLASS_AddRef
Zombie_Release
BASIC_DISPINTERFACE_GetTICount
BASIC_DISPINTERFACE_GetTypeInfo
BASIC_CLASS_GetIDsOfNames
BASIC_CLASS_Invoke
ord1688
urlmon
URLDownloadToFileA
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
user32
MessageBoxA
wsprintfA
Sections
sect_1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ