Static task
static1
Behavioral task
behavioral1
Sample
d00c0ba13000c41b2ffd8688a22682f736b291c038838f26da79efed11646dff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d00c0ba13000c41b2ffd8688a22682f736b291c038838f26da79efed11646dff.exe
Resource
win10v2004-20221111-en
General
-
Target
d00c0ba13000c41b2ffd8688a22682f736b291c038838f26da79efed11646dff
-
Size
76KB
-
MD5
3c9cb2b8662c4df3a8bc496709ed6f07
-
SHA1
ed9b1f3c91aa99a4663e50ef26095e3ecc756358
-
SHA256
d00c0ba13000c41b2ffd8688a22682f736b291c038838f26da79efed11646dff
-
SHA512
e3aefbfbf407022f6a51e7ca3ca0c21722a5548ca8aa630a833c4497add6b7bf03cee6fb1c94950e7b8f6d7cd95024591eb53500e5629dc93de26416da69707d
-
SSDEEP
768:U2taK5NI9LJRwI4zzvrbwO38Q33nLtgwhqPGdSksG+YRkXIoDvjwB0SNGBZS//Uq:UMicEOsQn5tyk4+k4obeZMBcl7F
Malware Config
Signatures
Files
-
d00c0ba13000c41b2ffd8688a22682f736b291c038838f26da79efed11646dff.exe windows x86
fb6a6c0dc7629d09448ed24649b9ef07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord593
ord594
ord598
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
ord670
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord713
ord607
ord608
ord717
ProcCallEngine
ord644
ord570
ord648
ord573
ord681
ord685
ord578
ord100
ord616
ord618
Sections
.AYKG Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.KAML Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MALS Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ