Static task
static1
Behavioral task
behavioral1
Sample
0b54ac777dcb48765adf9f116efa7b21b9c88356e986d9455b1a12e211fb974c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0b54ac777dcb48765adf9f116efa7b21b9c88356e986d9455b1a12e211fb974c.exe
Resource
win10v2004-20220812-en
General
-
Target
0b54ac777dcb48765adf9f116efa7b21b9c88356e986d9455b1a12e211fb974c
-
Size
252KB
-
MD5
11624a4f7dad0b1b1c0f911ef30c8f30
-
SHA1
c559fe39be0c61d092da235ee4ba47128f706492
-
SHA256
0b54ac777dcb48765adf9f116efa7b21b9c88356e986d9455b1a12e211fb974c
-
SHA512
a380d1a94d92c136a8bb61a9b3b0b80e201b282c0d02bc9f807d38b3e26ce5f0e42f70dec7e9e1c42ad2e92426a73fc7dac01475d5b15c576978cf6e9572f7fc
-
SSDEEP
3072:ptn5ymi8Eu11uZaLJbN2SQ3N7Do0JgT5SVtoaKGlD8yWC242UcdRCU4J4lg4E4tK:
Malware Config
Signatures
Files
-
0b54ac777dcb48765adf9f116efa7b21b9c88356e986d9455b1a12e211fb974c.exe windows x86
380f37e41087439510743be1d04a3b65
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord696
MethCallEngine
ord516
ord628
ord632
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ord717
ProcCallEngine
ord644
ord100
Sections
.text Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ