Static task
static1
Behavioral task
behavioral1
Sample
c696ffee53df1170904c9407c37ffabbc8c20377a07fd8297c2d67bb4c4fab65.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c696ffee53df1170904c9407c37ffabbc8c20377a07fd8297c2d67bb4c4fab65.exe
Resource
win10v2004-20220812-en
General
-
Target
c696ffee53df1170904c9407c37ffabbc8c20377a07fd8297c2d67bb4c4fab65
-
Size
229KB
-
MD5
5d8eae89e276c43e812aa1363a105d4c
-
SHA1
46d858cca0fcd7698662613746ad22c59de7b799
-
SHA256
c696ffee53df1170904c9407c37ffabbc8c20377a07fd8297c2d67bb4c4fab65
-
SHA512
2e7a070af46efbf1330e58883e84a86813e3e2c7362565c7a724711cb224918898d532ddda21f793068873b4330e8415073e88fb8bb24f02fc632a80ec664908
-
SSDEEP
3072:VurDFGkHQGKWCbCUcO66MeQg4tX94hu/nfBXQqUe:2o56s459nfBRl
Malware Config
Signatures
Files
-
c696ffee53df1170904c9407c37ffabbc8c20377a07fd8297c2d67bb4c4fab65.exe windows x86
9eb6590dee9bedce45d2c0f150711546
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord517
ord626
ord666
ord593
ord594
ord595
ord598
ord520
ord631
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord717
ProcCallEngine
ord644
ord537
ord645
ord681
ord100
ord616
ord617
ord618
Sections
.text Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ