Static task
static1
Behavioral task
behavioral1
Sample
e14e6841610b6710aa8a48f762e19fcf029d51e21f2993b1f64008e07496800a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e14e6841610b6710aa8a48f762e19fcf029d51e21f2993b1f64008e07496800a.exe
Resource
win10v2004-20220812-en
General
-
Target
e14e6841610b6710aa8a48f762e19fcf029d51e21f2993b1f64008e07496800a
-
Size
20KB
-
MD5
f4c964f4b783c787ceaa9420eedd7a14
-
SHA1
73af1739d5e8795301928347f493a2c342ea3bfe
-
SHA256
e14e6841610b6710aa8a48f762e19fcf029d51e21f2993b1f64008e07496800a
-
SHA512
ccb5a7987ed663df253ec4307dbff0210ad7ca279cd678c407cdc4e80c4b2571fa311378356f42b7ad3a23ac9f16406337f10f1f122f924364ba938473e3108f
-
SSDEEP
192:9Us+ylka2A+6Jheq2CE3AxxH51mtGlTq9jUC:9Ual12j6JhevAp0jUC
Malware Config
Signatures
Files
-
e14e6841610b6710aa8a48f762e19fcf029d51e21f2993b1f64008e07496800a.exe windows x86
24042350a0bb677dddc3c1d1873c8092
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
MethCallEngine
ord516
ord709
ord525
ord632
ord633
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord609
ord717
ProcCallEngine
ord644
ord100
ord689
ord616
ord617
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ