Static task
static1
Behavioral task
behavioral1
Sample
c64a7d3b26d3606be86922b7edfb25e260ba2377bf7aadfc139115898370eb2d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c64a7d3b26d3606be86922b7edfb25e260ba2377bf7aadfc139115898370eb2d.exe
Resource
win10v2004-20220812-en
General
-
Target
c64a7d3b26d3606be86922b7edfb25e260ba2377bf7aadfc139115898370eb2d
-
Size
300KB
-
MD5
0201d78e1f1a84fbb5d2782d0bfb7680
-
SHA1
88464c51986037bcfc5d11de55392b1f606d1ef2
-
SHA256
c64a7d3b26d3606be86922b7edfb25e260ba2377bf7aadfc139115898370eb2d
-
SHA512
38dad5e742d1fda5a9d59f22ce8c60192b8c911138c9050c8766a3c690c2951d11844c7153a42533b359ff15814c8e50334cfefb3182d6f31fe999ecb869f0f5
-
SSDEEP
6144:kAgusKuzNSYokX6w1UbgwDO7zRpmM57M186DMd:rgKuzNSYWm
Malware Config
Signatures
Files
-
c64a7d3b26d3606be86922b7edfb25e260ba2377bf7aadfc139115898370eb2d.exe windows x86
1cdb53e78e70ec7a698853bb07ece53f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord582
ord583
ord584
ord585
ord187
ord586
ord693
ord587
ord588
ord696
MethCallEngine
ord516
ord517
ord518
ord519
ord669
ord598
ord599
ord520
ord709
ord631
ord632
ord633
EVENT_SINK_AddRef
ord527
ord528
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord714
ord608
ord530
ord717
ord533
ProcCallEngine
ord535
ord537
ord644
ord645
ord647
ord681
ord578
ord100
ord579
ord614
ord616
ord617
ord618
ord619
ord581
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ