Static task
static1
Behavioral task
behavioral1
Sample
88f8c87626ef0e9f7dfd5a6a78716936926ed1fb555d5655e84b6992998411eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88f8c87626ef0e9f7dfd5a6a78716936926ed1fb555d5655e84b6992998411eb.exe
Resource
win10v2004-20220812-en
General
-
Target
88f8c87626ef0e9f7dfd5a6a78716936926ed1fb555d5655e84b6992998411eb
-
Size
773KB
-
MD5
0ea759e6441847bef2d77ed9545dda07
-
SHA1
9312a5fdf4aef24aee68a942f10b09733cdff573
-
SHA256
88f8c87626ef0e9f7dfd5a6a78716936926ed1fb555d5655e84b6992998411eb
-
SHA512
b4ea69c373e45db27284dee2887bfb0ee850626f6ffb052fbe9495836ac4434f89fcc1fb8a35643d4c7f42ddd5c6b4716366fcc20a47e78edd9966ab67a1f7c4
-
SSDEEP
24576:ih9LsSqbC8fBQFcYHnpXj5ugrlEIHBaLUSK:ijLsSLcOXtusSIhyUx
Malware Config
Signatures
Files
-
88f8c87626ef0e9f7dfd5a6a78716936926ed1fb555d5655e84b6992998411eb.exe windows x86
73867813c0a6f51c2c1c7520ccc21298
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetModuleFileNameW
GetStartupInfoA
Sleep
HeapDestroy
lstrlenW
ReleaseMutex
CreateEventA
DeleteFileA
CloseHandle
HeapCreate
SetConsoleCP
OpenMutexA
GetCommandLineA
GetTickCount
SetEvent
VirtualProtect
ResumeThread
GetModuleHandleA
GetTimeFormatA
advapi32
CreateServiceW
IsValidAcl
RegCreateKeyExW
ClearEventLogW
ControlService
IsValidSecurityDescriptor
IsValidSid
RegEnumKeyA
CreateProcessAsUserA
IsTextUnicode
InitializeSid
RegQueryValueW
RegDeleteValueA
msvcirt
??0Iostream_init@@QAE@XZ
??0Iostream_init@@QAE@XZ
??0Iostream_init@@QAE@XZ
??0Iostream_init@@QAE@XZ
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 763KB - Virtual size: 763KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ