Static task
static1
Behavioral task
behavioral1
Sample
e48563e4042ab6d6bd3499b1e068992e10046b0cc6a77f71f7a01f9c535fc1b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e48563e4042ab6d6bd3499b1e068992e10046b0cc6a77f71f7a01f9c535fc1b2.exe
Resource
win10v2004-20220901-en
General
-
Target
e48563e4042ab6d6bd3499b1e068992e10046b0cc6a77f71f7a01f9c535fc1b2
-
Size
65KB
-
MD5
1676f464f9b512fa40bfcfd26759729a
-
SHA1
72ad2aca09cdbc9c154fda2151cb04d1d5510f9b
-
SHA256
e48563e4042ab6d6bd3499b1e068992e10046b0cc6a77f71f7a01f9c535fc1b2
-
SHA512
a008fb0ac1332d8602d3f6f5edd76eddd35b39690903197a911b35965c171548cf1523227410481ee2134b08872005c5c895c8164c22eb94110a09e9747dd747
-
SSDEEP
1536:97BCGCEPuFd18EmD/yEiUqiBYi2/Fm81u+:9tCAPugUiBYiKmuu+
Malware Config
Signatures
Files
-
e48563e4042ab6d6bd3499b1e068992e10046b0cc6a77f71f7a01f9c535fc1b2.exe windows x86
f4b86dbcac8ec462897fc2e160b91884
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
oleaut32
SysAllocStringLen
msvbvm60
MethCallEngine
ord516
ord669
ord595
ord598
ord631
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord607
ord608
ProcCallEngine
ord535
ord537
ord644
ord645
ord648
ord573
ord681
ord578
ord100
ord617
ord619
Sections
.**** Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.**** Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.**** Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ