Static task
static1
Behavioral task
behavioral1
Sample
cc8e62d91046f58a35c82a3f2d139aa6b9ba22d4d950a91a93526b48dd267b8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc8e62d91046f58a35c82a3f2d139aa6b9ba22d4d950a91a93526b48dd267b8c.exe
Resource
win10v2004-20220812-en
General
-
Target
cc8e62d91046f58a35c82a3f2d139aa6b9ba22d4d950a91a93526b48dd267b8c
-
Size
120KB
-
MD5
4ba2ad33df10a48502784c82c4deb340
-
SHA1
c5fdadc25a0e8560a9ffce24b6d126458a4943ce
-
SHA256
cc8e62d91046f58a35c82a3f2d139aa6b9ba22d4d950a91a93526b48dd267b8c
-
SHA512
37c579fba86f3460374dbff7c1d74b2682d338ae62879966ea5fc70ae3ea2ed57f813fed46d5f89b698e01325ab5dd4418010845f061ed16d8e8b581a41828b8
-
SSDEEP
1536:FrFCF+feS6Vf9qaXGE2Mtf9oUrUQKiQg9F5tkV7pjuX5e6wTeU/6lYkt5ycQg:zC2etVfQW2MtF3lV9qEYyLX
Malware Config
Signatures
Files
-
cc8e62d91046f58a35c82a3f2d139aa6b9ba22d4d950a91a93526b48dd267b8c.exe windows x86
2c5468e8d29589fbc9924ac62cdabe0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord187
MethCallEngine
ord516
ord517
ord519
ord669
ord300
ord301
ord302
ord303
ord305
ord306
ord307
ord308
ord309
ord631
ord709
ord525
ord632
EVENT_SINK_AddRef
ord527
ord528
DllFunctionCall
ord564
EVENT_SINK_Release
ord311
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord313
ord712
ord607
ord608
ord717
ProcCallEngine
ord535
ord537
ord644
ord645
ord647
ord681
ord685
ord578
ord100
ord579
ord616
ord617
ord618
ord619
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bjybhoi Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lugivji Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE