Static task
static1
Behavioral task
behavioral1
Sample
db756a93d1acf271a048a70ad007ef8c7f3ed5b499ffd3c4f7afccdc9b4c271e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db756a93d1acf271a048a70ad007ef8c7f3ed5b499ffd3c4f7afccdc9b4c271e.exe
Resource
win10v2004-20221111-en
General
-
Target
db756a93d1acf271a048a70ad007ef8c7f3ed5b499ffd3c4f7afccdc9b4c271e
-
Size
36KB
-
MD5
a7a0ed57a44e30283f25644576cd5a2b
-
SHA1
b2bf1fd50c17bb6e5e335e153013d9b91e020459
-
SHA256
db756a93d1acf271a048a70ad007ef8c7f3ed5b499ffd3c4f7afccdc9b4c271e
-
SHA512
e66c760dca627caa7874d9fc44056055477d88bc8d51db2d30be5076f84c6d48278cd6100e075e9eebd3a1079e41c848c38514cb8415034f737c7addb5c24a9a
-
SSDEEP
768:rLejBVCZ+R5MmHV8uLG0z6QLHDnpFKrYutlmrmx:oPCLk1DE
Malware Config
Signatures
Files
-
db756a93d1acf271a048a70ad007ef8c7f3ed5b499ffd3c4f7afccdc9b4c271e.exe windows x86
865f68e61bb0025d7c163caa73e1741c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord518
ord593
ord594
ord598
ord632
EVENT_SINK_AddRef
ord529
ord561
DllFunctionCall
ord670
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ProcCallEngine
ord645
ord571
ord685
ord100
ord616
ord617
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ