Static task
static1
Behavioral task
behavioral1
Sample
c5607747b78179757d8ae60f1496d19db49a1d47cb0133688426eb8b7e71d690.exe
Resource
win7-20221111-en
General
-
Target
c5607747b78179757d8ae60f1496d19db49a1d47cb0133688426eb8b7e71d690
-
Size
569KB
-
MD5
d2695393da8abc97cd9c877e6a7d004b
-
SHA1
03d2357ba3f107e90433eb2b31fb45e841ed6310
-
SHA256
c5607747b78179757d8ae60f1496d19db49a1d47cb0133688426eb8b7e71d690
-
SHA512
8dae565e6bbf4b08e5048d41fd75e86c67559f3f72caf2ab392cdc0af0974b4c47caf1b084538eadc6952c8cf55eb536b02aee72cdfca99bc19d8e83cd3781c0
-
SSDEEP
12288:TwIUGN9YHv4fgpIncxR3eoGKnEO8+0wgNAuOkwY4CDi+wDsaNcSwTtcJ0c:TwNSitSAR3eIh05VT4CDi+QsaOcJ0c
Malware Config
Signatures
Files
-
c5607747b78179757d8ae60f1496d19db49a1d47cb0133688426eb8b7e71d690.exe windows x86
4143eaa1ee26cbceeff0635aec818724
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
LocalAlloc
HeapAlloc
GetLocaleInfoA
DeleteCriticalSection
GetModuleHandleA
SetConsoleCP
FreeEnvironmentStringsW
GetModuleHandleW
VirtualProtect
GetStartupInfoA
SetStdHandle
ExitProcess
GetComputerNameW
GetACP
ExpandEnvironmentStringsW
InitializeCriticalSection
LocalFree
IsDebuggerPresent
GetOEMCP
ole32
CoTaskMemFree
StringFromGUID2
gdi32
GetObjectW
SetBkMode
user32
ScreenToClient
SetWindowTextW
WindowFromPoint
DialogBoxParamW
msvcrt
malloc
__p__commode
??1type_info@@UAE@XZ
advapi32
RegDeleteKeyW
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 441KB - Virtual size: 806KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ