Static task
static1
Behavioral task
behavioral1
Sample
88c4ad184b0c1592b72a05d423d78607.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
88c4ad184b0c1592b72a05d423d78607.exe
Resource
win10v2004-20231215-en
General
-
Target
88c4ad184b0c1592b72a05d423d78607
-
Size
44KB
-
MD5
88c4ad184b0c1592b72a05d423d78607
-
SHA1
f8bc6694c265d3e0da9f377df186c97a94544439
-
SHA256
b0357c2c519c107cf494377b547f35b50efa9ad4f985f32175b413ceada902eb
-
SHA512
35146519118d0827d9a71cadcc1533ea00ffe5575b148432d7d654405d47ffe9dffae5da645d4124500fbd45bde9c10398ba097f44e150c8a22b3352a0c6e543
-
SSDEEP
384:HnY2OnNHnY9H8Egr6NerUzgCabslAtWxbgzfNyZC8S7cBy0M+8xp5posgIQB1:/eYmnWzgRAl5qPhAdRcp5posgIM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88c4ad184b0c1592b72a05d423d78607
Files
-
88c4ad184b0c1592b72a05d423d78607.exe windows:4 windows x86 arch:x86
70132e67352d913ae97b00869f961e00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
CreateRemoteThread
MultiByteToWideChar
GetSystemDirectoryA
GetCurrentProcess
VirtualFreeEx
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
CloseHandle
SetEvent
SuspendThread
ResumeThread
GetLastError
CreateEventA
CreateThread
lstrlenW
WaitForSingleObject
GetStringTypeW
GetStringTypeA
SetFilePointer
SetStdHandle
FlushFileBuffers
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
WideCharToMultiByte
LCMapStringA
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
advapi32
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
OpenServiceA
psapi
EnumProcessModules
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcesses
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE