Static task
static1
Behavioral task
behavioral1
Sample
097b0639eac5dce89da4f863e328cb7cdb59dddb97874056d5745baa6aa549fc.exe
Resource
win7-20230220-en
General
-
Target
097b0639eac5dce89da4f863e328cb7cdb59dddb97874056d5745baa6aa549fc.zip
-
Size
344KB
-
MD5
1d3360a26d407c051f5355dd1f18c56c
-
SHA1
e08e208549786f1ac0b37226b646553a08fac1fd
-
SHA256
1bc3ccfedd7ea50fe761a3aa4d1c5319082125de773054f08049d5a50d6962fa
-
SHA512
72ff0e77d91dc294fed1ea627908a371da73d06846fc3117d4d5c2903b2348fdebd370af539cf042fb4af461788beaa2dcf9257b9aca7ef28b764b042ffaeef4
-
SSDEEP
6144:RsQtkewC3Jh6WZDVVX93007mH7n0S6Hg2Bf8jsRbca47glZy5BCUMka:R/tvwYJXZxmHb6ASf4sbCDMka
Malware Config
Signatures
Files
-
097b0639eac5dce89da4f863e328cb7cdb59dddb97874056d5745baa6aa549fc.zip.zip
Password: infected
-
097b0639eac5dce89da4f863e328cb7cdb59dddb97874056d5745baa6aa549fc.exe.exe windows x86
Password: infected
b9606ccae7f25235a598b6c63c59eea3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
ord690
ord587
MethCallEngine
EVENT_SINK_Invoke
ord517
ord553
ord660
ord662
ord556
ord557
ord558
ord667
Zombie_GetTypeInfo
ord592
ord593
ord594
ord595
ord596
ord520
ord709
ord631
ord525
ord632
ord526
EVENT_SINK_AddRef
ord528
ord562
DllFunctionCall
ord563
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord710
ord711
ord712
ord606
ord608
ord716
ord717
ProcCallEngine
ord537
ord644
ord645
ord538
ord539
ord646
ord648
ord572
ord681
ord685
ord100
ord689
ord610
ord616
ord617
ord618
ord619
ord542
ord543
ord544
ord545
ord546
ord547
ord581
Sections
.text Size: 496KB - Virtual size: 495KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ