Static task
static1
Behavioral task
behavioral1
Sample
b189a5ba2a3c02022a59468b4205a691498e4393b08bb044cfeaaff35c4b469d.exe
Resource
win7-20221111-en
General
-
Target
b189a5ba2a3c02022a59468b4205a691498e4393b08bb044cfeaaff35c4b469d
-
Size
272KB
-
MD5
07d796a5e480ea8f9e84243e3af5c745
-
SHA1
a13dbae01348e856dd884ef4088bb0ed8e6ef498
-
SHA256
b189a5ba2a3c02022a59468b4205a691498e4393b08bb044cfeaaff35c4b469d
-
SHA512
bc2d76a272c45939e30069ee264297c5a4cd54143d5f8e67bb176bcca96842847180f246f162ec72fd3786cfc4d01b8c6a0644b0659c2f49f5e4a172211c3d3f
-
SSDEEP
6144:PcUK3qDpvTT6LDuibf+phTjnshbn2VpWzBJpcwegVS:PcU7TOLDuibWphfk2VWTT4
Malware Config
Signatures
Files
-
b189a5ba2a3c02022a59468b4205a691498e4393b08bb044cfeaaff35c4b469d.exe windows x86
f2ba1e6021ee51caa7059c5e0d62d110
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord598
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord607
ord608
ProcCallEngine
ord644
ord100
ord617
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wyrwpgt Size: 72KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE