Static task
static1
Behavioral task
behavioral1
Sample
b6361c901ea0cfbd79134afba94148e66e28ee5c64570edd86ab629d392f61f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6361c901ea0cfbd79134afba94148e66e28ee5c64570edd86ab629d392f61f3.exe
Resource
win10v2004-20220901-en
General
-
Target
b6361c901ea0cfbd79134afba94148e66e28ee5c64570edd86ab629d392f61f3
-
Size
96KB
-
MD5
e514690d244cfcb456f3406db992fd61
-
SHA1
49f7fd5fb379727716188bf41ee1b17911f1b1a7
-
SHA256
b6361c901ea0cfbd79134afba94148e66e28ee5c64570edd86ab629d392f61f3
-
SHA512
671810e125f3dedceca7dde54cfecf40612d027165209bb4d1bb7747933f81f3377c68c87507363598158d5a32492a13a276aa7e4f828a779f47d2c9fb28137e
-
SSDEEP
1536:tk58ieuwzL26O7RiSr4a/pRCo+GUt3KkIHHJdceOwDa:2wuwuJ3RRXmDIHHP3Oma
Malware Config
Signatures
Files
-
b6361c901ea0cfbd79134afba94148e66e28ee5c64570edd86ab629d392f61f3.exe windows x86
e8994545aec57963f4cc9465da954336
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord595
ord631
ord632
ord526
EVENT_SINK_AddRef
ord561
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord608
ord717
ProcCallEngine
ord644
ord537
ord572
ord573
ord685
ord100
ord617
ord619
ord581
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc_0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
���� Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE