Static task
static1
Behavioral task
behavioral1
Sample
67d359a5b9a30a6055c4aaa21b2f90a48c9e55d96e6efe3ebef9d15340b0c615.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67d359a5b9a30a6055c4aaa21b2f90a48c9e55d96e6efe3ebef9d15340b0c615.exe
Resource
win10v2004-20221111-en
General
-
Target
67d359a5b9a30a6055c4aaa21b2f90a48c9e55d96e6efe3ebef9d15340b0c615.zip
-
Size
97KB
-
MD5
a0560730ba9a77bbb8b4e85b74fa0fef
-
SHA1
da72d650630971b99b571d016017ee3a8ac9ec5a
-
SHA256
c9e928fcd15f6a86ed6e6c867d4a2d01438bc95118ec35cd84f33e83e24f9501
-
SHA512
e76b2b58a63c61bedf7cdcc53993ecddb5074b3fbee65ecd119ccd10dea4729381e272b3d40ad5393fc055252b9dd6ab39f2f5e8eb0c801bef99d3d284cb530b
-
SSDEEP
1536:vFwLBB9fZvMjijypRFfA8Otm7GKPY4dRgfUB1ajCWGSnvmYncJxSzd/LrWAauXUF:vkfZvMiHm7GJ4dMO1+CWGSnbc6h3DXUF
Malware Config
Signatures
Files
-
67d359a5b9a30a6055c4aaa21b2f90a48c9e55d96e6efe3ebef9d15340b0c615.zip.zip
Password: infected
-
67d359a5b9a30a6055c4aaa21b2f90a48c9e55d96e6efe3ebef9d15340b0c615.exe.exe windows x86
Password: infected
83320f050ef3d9c7f7931d6b7b1cc3a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaStrVarMove
__vbaLateIdCall
__vbaLenBstr
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
ord516
_adj_fprem1
ord518
__vbaCVarAryUdt
__vbaStrCat
__vbaVarCmpNe
ord660
ord553
__vbaLsetFixstr
__vbaStrDate
ord661
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaVarCmpGe
__vbaLateMemSt
__vbaExitProc
__vbaObjSet
ord595
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
ord520
__vbaStrFixstr
__vbaBoolVarNull
_CIsin
__vbaErase
ord632
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord528
__vbaStrCmp
__vbaVarTstEq
__vbaDateR8
__vbaObjVar
__vbaI2I4
ord561
DllFunctionCall
__vbaVarOr
__vbaCastObjVar
__vbaRedimPreserve
_adj_fpatan
__vbaFixstrConstruct
__vbaLateIdCallLd
__vbaRedim
EVENT_SINK_Release
__vbaNew
_CIsqrt
__vbaLateIdCallSt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
ord712
__vbaPrintFile
_adj_fprem
_adj_fdivr_m64
__vbaUdtVar
__vbaI2Str
ord716
__vbaVarCmpLe
__vbaFPException
__vbaUbound
__vbaStrVarVal
__vbaVarCat
__vbaDateVar
__vbaLsetFixstrFree
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaNew2
ord648
__vbaR8Str
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
__vbaR8Var
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
ord610
__vbaLateMemCall
__vbaVarAdd
__vbaStrToAnsi
__vbaVarDup
__vbaFreeVarg
__vbaFpI2
__vbaFpI4
ord617
__vbaLateMemCallLd
_CIatan
__vbaCastObj
__vbaStrMove
__vbaI2ErrVar
ord542
_allmul
__vbaLateIdSt
ord545
_CItan
ord546
_CIexp
__vbaFreeStr
__vbaFreeObj
__vbaRecAssign
Sections
.text Size: 200KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ