Static task
static1
Behavioral task
behavioral1
Sample
888244e0fd4cafa5159ab01cf5323a98.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
888244e0fd4cafa5159ab01cf5323a98.exe
Resource
win10v2004-20231215-en
General
-
Target
888244e0fd4cafa5159ab01cf5323a98
-
Size
220KB
-
MD5
888244e0fd4cafa5159ab01cf5323a98
-
SHA1
64e5c1b0346df2f4f84e4c55ac406b4481df8fe4
-
SHA256
0892b8b0c506a857cff1f2fc6e5f55ce9f76bc3cb9f10c2e02fc541dc26ed9e5
-
SHA512
e60a4cedfe25d4ed00debda8c51b485f1e2a82b52f00e2bd75d8b67012dd908236f09914b2c8e4bb08a12aa370f94f19eac81919b4d83ac53965893addd9c56f
-
SSDEEP
6144:pndEKshSmRoadkjp5k1mqCD0t26KGt/LFLC:LETlRogkjgcwR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 888244e0fd4cafa5159ab01cf5323a98
Files
-
888244e0fd4cafa5159ab01cf5323a98.exe windows:4 windows x86 arch:x86
7a1d5da0655b2ea457f3c1f054c399f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
WriteConsoleInputA
SetWaitableTimer
CreateThread
IsValidCodePage
RemoveDirectoryA
LCMapStringA
SetConsoleInputExeNameA
FileTimeToDosDateTime
GetDiskFreeSpaceA
GetCurrentProcess
ReleaseSemaphore
SetComputerNameExA
DeleteFileA
GetCommandLineW
HeapFree
GetTempPathA
GetLogicalDriveStringsA
GetTapeStatus
GetFileAttributesExA
GetCurrentThread
WriteConsoleOutputA
SetCommBreak
SetCalendarInfoA
HeapAlloc
WriteProfileStringA
GetModuleHandleA
HeapSize
IsBadHugeReadPtr
VirtualAlloc
ws2_32
socket
Sections
.itext Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 180KB - Virtual size: 840KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ