Static task
static1
Behavioral task
behavioral1
Sample
a4f150da20b0fb10c54a134a628be7798c286855033dd912ce6665ed9c3ad3d3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4f150da20b0fb10c54a134a628be7798c286855033dd912ce6665ed9c3ad3d3.exe
Resource
win10v2004-20220812-en
General
-
Target
a4f150da20b0fb10c54a134a628be7798c286855033dd912ce6665ed9c3ad3d3
-
Size
7KB
-
MD5
96682abe8067fc6a330a234774ae2225
-
SHA1
b8c9be7417bfea43d256acd9419d3591bf2ef486
-
SHA256
a4f150da20b0fb10c54a134a628be7798c286855033dd912ce6665ed9c3ad3d3
-
SHA512
4b5ab2d548be14330ac2274be50c46796274ad061d183b61299798bef3e0f27f760a93f14ee3ba02c4933a195fb1c042d68b65f7954d7018c0577c04bf7f34de
-
SSDEEP
96:zbYfbkXPuiCRqnm23UXDjeB0VrzlprZDiL/NlfbVB+:zkoXl9xnsXlp6P+
Malware Config
Signatures
Files
-
a4f150da20b0fb10c54a134a628be7798c286855033dd912ce6665ed9c3ad3d3.exe windows x86
ca647a3977795872f36236c40ef017da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord526
DllFunctionCall
__vbaExceptHandler
ord711
ord717
ProcCallEngine
ord644
ord570
ord100
Sections
.text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
komputil Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE