Static task
static1
Behavioral task
behavioral1
Sample
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe
Resource
win7-20220812-en
General
-
Target
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e
-
Size
187KB
-
MD5
91888187380d41d46b171002796986c1
-
SHA1
558a5b2be936f658c24474d592fd45fabc5b1702
-
SHA256
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e
-
SHA512
b48b462f82b19b502d21b395251cc78498d0a541247e98db4d4a89b84963cd4e0ad50fd462ab078f0b406117040fdbc08a636bf105e0f09421e4f16a6c19dc98
-
SSDEEP
3072:ap+Q+Q+SUDSxa3Z9XVR4MlwtL4Voa+iTTADtZzZpQalIw:+AQk1PuGVpTAdt
Malware Config
Signatures
Files
-
29833c1fdb7e062ec82af935f480b93140fec62d7cb48487ab2b6f0bcf363f0e.exe windows x86
9b4db6b48448269f8dd58376abc0382e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
LoadLibraryW
GetFullPathNameW
GetAtomNameW
lstrcpyA
GetTimeZoneInformation
CreateThread
InitializeCriticalSection
GetTempPathA
OutputDebugStringA
EnumResourceNamesA
EnterCriticalSection
IsDBCSLeadByte
GetProcAddress
WaitForSingleObject
FileTimeToSystemTime
SetEvent
QueryMemoryResourceNotification
LeaveCriticalSection
LoadLibraryA
GetFullPathNameA
Sleep
DeleteCriticalSection
ResetEvent
FreeLibrary
msimg32
AlphaBlend
TransparentBlt
winmm
mciSendCommandA
sndPlaySoundA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
setupapi
InstallCatalog
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
shlwapi
PathAddBackslashA
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ