Static task
static1
Behavioral task
behavioral1
Sample
b7ad9b6877f39d03f398f83cf553fbbf589e86ed6127306507823f7777c84942.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7ad9b6877f39d03f398f83cf553fbbf589e86ed6127306507823f7777c84942.exe
Resource
win10v2004-20221111-en
General
-
Target
b7ad9b6877f39d03f398f83cf553fbbf589e86ed6127306507823f7777c84942
-
Size
307KB
-
MD5
b46661ff570e9639df577480aaee467a
-
SHA1
4284731d71f5552a84c446824c96587170c873b1
-
SHA256
b7ad9b6877f39d03f398f83cf553fbbf589e86ed6127306507823f7777c84942
-
SHA512
c2acff719c7078b8b8e3f4404d5207a808e09bf6052b5221e38cb4d41dc81744c97ca1167e3f0360de8f4d9b97d110d40172b820797772be7dd053cac604ba49
-
SSDEEP
3072:w7BdhiKExGM994OV4tkkJG7IZ+P5iW0syG3jPPbzmWQiAAa/vW1fB:ILkfsIOiAvWj
Malware Config
Signatures
Files
-
b7ad9b6877f39d03f398f83cf553fbbf589e86ed6127306507823f7777c84942.exe windows x86
0edc71c76d153dcb4db9df8381a5b291
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord666
ord593
ord594
ord598
ord631
ord525
ord526
EVENT_SINK_AddRef
ord528
ord529
ord561
DllFunctionCall
EVENT_SINK_Release
ord600
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord570
ord648
ord572
ord573
ord681
ord576
ord685
ord578
ord100
ord616
ord617
ord619
ord581
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
����a Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE