Static task
static1
Behavioral task
behavioral1
Sample
e5faea2dcb6d4be5059996d44b17203939093341f5c3879e0e67026f04c4a07a.exe
Resource
win7-20220812-en
General
-
Target
e5faea2dcb6d4be5059996d44b17203939093341f5c3879e0e67026f04c4a07a
-
Size
343KB
-
MD5
47d1a7512e31c4571dc973b5d50f1d7c
-
SHA1
e912a4d1e453e68adb99f2257f55f94af606ad6f
-
SHA256
e5faea2dcb6d4be5059996d44b17203939093341f5c3879e0e67026f04c4a07a
-
SHA512
4f96d9529be99a16d4e48357fae4e1a64f9ddd2e2c772b194333985b435547cb208a7febd8100f7e1847a9e915c53f714011f7ae8969e6db86fe924279295e5b
-
SSDEEP
6144:ZxYCEwiGewl4gJIkzxrO5rFu4JMyejbu74niIXLLgydy2ylV:/YseqbUGu5B4niIXLLgydFm
Malware Config
Signatures
Files
-
e5faea2dcb6d4be5059996d44b17203939093341f5c3879e0e67026f04c4a07a.exe windows x86
246f6f6fe6609408288ebe9befc4dab6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord595
ord598
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord607
ord717
ProcCallEngine
ord644
ord570
ord685
ord100
ord616
Sections
xxxxxxxx Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xxxxxxxx Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xxxxxxxx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE