Static task
static1
Behavioral task
behavioral1
Sample
e86771720e10a7fef6720d022604a6b5e57280fa90fdaf2c25725307720475b4.exe
Resource
win7-20220812-en
General
-
Target
e86771720e10a7fef6720d022604a6b5e57280fa90fdaf2c25725307720475b4
-
Size
180KB
-
MD5
2efbe67e13c2d5f04b71a5d21e3dae72
-
SHA1
a8b03629b5bc24d9a9003567fcbbc868f88d6bc9
-
SHA256
e86771720e10a7fef6720d022604a6b5e57280fa90fdaf2c25725307720475b4
-
SHA512
8eef0b7917d1f1bbd23b75f2fe5e1ff9a15e9d4759a5991511eb05dcfddce534022dc42c4bfb830d418ce996c9b6cbc64a31fadbf28b7fc817b80d27bba84ff8
-
SSDEEP
3072:pCbLSL5zAsdHm490ySm1EcOYG3aa+zvRz5N8uy:pCPq+EHm49mMEB8vXNhy
Malware Config
Signatures
Files
-
e86771720e10a7fef6720d022604a6b5e57280fa90fdaf2c25725307720475b4.exe windows x86
b6604e9bbec98c55e9a1b7db76c835c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord300
ord595
ord598
ord306
ord525
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord716
ord100
ord610
ord616
ord617
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE