Static task
static1
Behavioral task
behavioral1
Sample
bc4f27de629b146aea9c8fb67049f185919020973370714556ae9939c9b8b147.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc4f27de629b146aea9c8fb67049f185919020973370714556ae9939c9b8b147.exe
Resource
win10v2004-20220901-en
General
-
Target
bc4f27de629b146aea9c8fb67049f185919020973370714556ae9939c9b8b147
-
Size
228KB
-
MD5
7e2d18b255cbe35e7cc13060511ed9af
-
SHA1
43b3c576b8106f8100330b4561b3b1d2088ac36b
-
SHA256
bc4f27de629b146aea9c8fb67049f185919020973370714556ae9939c9b8b147
-
SHA512
893dcd00533b0d03864dbf1ad6031af908acdbcd0656634a89acd7d85a7ca9d645f4b936e72689fb1cb47043e9e4734a94e272f62d40f322addb8a8c9c07c445
-
SSDEEP
3072:duWbt3BnwxFob+IthIaol7TUBY0Ufk3c:VNJsm+9lv9Jfk
Malware Config
Signatures
Files
-
bc4f27de629b146aea9c8fb67049f185919020973370714556ae9939c9b8b147.exe windows x86
34ed359742c50b42e937727531d7136a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord607
ord608
ProcCallEngine
ord644
ord100
ord617
ord581
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eovnyml Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE