Static task
static1
Behavioral task
behavioral1
Sample
051d5786dd126b55f8d03cac2a360b0cac9925735bc3878e38fb103ac20d4709.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
051d5786dd126b55f8d03cac2a360b0cac9925735bc3878e38fb103ac20d4709.exe
Resource
win10v2004-20220812-en
General
-
Target
051d5786dd126b55f8d03cac2a360b0cac9925735bc3878e38fb103ac20d4709
-
Size
332KB
-
MD5
017a9be6be9077613df9e611eab77a20
-
SHA1
d0a932addf16540f6f2dfd26ac7603a3625fdb0e
-
SHA256
051d5786dd126b55f8d03cac2a360b0cac9925735bc3878e38fb103ac20d4709
-
SHA512
f958c0cb030a8b76cd24d5025378eab312afff70d8fe1bd956629de1d721ae4f0e5e30c9cacd9a0e25fb842e432da87a08413ff29dff07b15654a77bbf871a60
-
SSDEEP
6144:7S5kalxljOvUrvlzVAV8Hd1pgfLBG8CQdTQ:OkaLoG9zqV891pgVj
Malware Config
Signatures
Files
-
051d5786dd126b55f8d03cac2a360b0cac9925735bc3878e38fb103ac20d4709.exe windows x86
6f6bae3269a3de780bb57f6d83701cde
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaAryMove
__vbaFreeVar
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
__vbaHresultCheckObj
__vbaLenBstrB
_adj_fdiv_m32
__vbaAryDestruct
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
ord598
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
DllFunctionCall
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaUbound
_CIlog
__vbaErrorOverflow
__vbaVar2Vec
__vbaNew2
__vbaR8Str
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaAryLock
_CIatan
__vbaStrMove
ord650
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeStr
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ