Static task
static1
Behavioral task
behavioral1
Sample
f597245db6a48480cadbc28e3562f3fda098897c24f5e604a90833a2da5ebdeb.exe
Resource
win7-20220812-en
General
-
Target
f597245db6a48480cadbc28e3562f3fda098897c24f5e604a90833a2da5ebdeb
-
Size
175KB
-
MD5
c8e928095fd926c4e79f7b93de2ce052
-
SHA1
cb76eb6c28a56f75b3a35871503ee6777ad3a870
-
SHA256
f597245db6a48480cadbc28e3562f3fda098897c24f5e604a90833a2da5ebdeb
-
SHA512
f84ab6ae05729d1fc1a2df4c293b0e4d2bde2bbfd007c269820e1ef99b467f80ce7cd2bbc6343c63982dc4ddfb234ac6487ed28400776f1e53650420b437584a
-
SSDEEP
3072:YrR4vgwagT/N6H6l6KRpLizetR4f82xvEO1rVf976NmNUkxqtiABu+C+BPhPEu:YGoJgT86lJRpLwc4TxMSrVf97CaLgth9
Malware Config
Signatures
Files
-
f597245db6a48480cadbc28e3562f3fda098897c24f5e604a90833a2da5ebdeb.exe windows x86
05d94172c0ac81319f3c5d346bc3bf03
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msimg32
AlphaBlend
TransparentBlt
kernel32
DeleteCriticalSection
GetAtomNameW
FileTimeToSystemTime
WaitForSingleObject
LoadLibraryA
GetFullPathNameW
SetEvent
LeaveCriticalSection
GetFullPathNameA
IsDBCSLeadByte
GetTimeZoneInformation
lstrcpyA
EnumResourceNamesA
Sleep
InitializeCriticalSection
QueryMemoryResourceNotification
ResetEvent
EnterCriticalSection
OutputDebugStringA
GetTickCount
GetProcAddress
GetTempPathA
LoadLibraryW
CreateThread
FreeLibrary
winmm
mciSendCommandA
sndPlaySoundA
setupapi
InstallCatalog
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
shlwapi
PathAddBackslashA
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ