Static task
static1
Behavioral task
behavioral1
Sample
c88db9963a9015d1949c8ab22dde4e28.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c88db9963a9015d1949c8ab22dde4e28.exe
Resource
win10v2004-20240226-en
General
-
Target
c88db9963a9015d1949c8ab22dde4e28
-
Size
32KB
-
MD5
c88db9963a9015d1949c8ab22dde4e28
-
SHA1
e4dd6e595ffdee7ce5ea8d78eff52d3abad4b709
-
SHA256
3f2bb04deac4351841fac06ebded01dc6b22d7d472a46e9e5ab6a5cdc1e70e5e
-
SHA512
79e3cf06b3a4e612f1700247136f2871369438fa9a97cda2a701ec73311a2c7b96afe7a0590d3b2acae82afda6f572c68db8f119fed186a967d3b16eeba87503
-
SSDEEP
384:qFRMNP1GbY88CM/FX4mD2beL0mB3pvhCvooYjqwXpJ2MD:GqiY889/F4K2bclpvhLpdX2M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c88db9963a9015d1949c8ab22dde4e28
Files
-
c88db9963a9015d1949c8ab22dde4e28.exe windows:1 windows x86 arch:x86
5c65d8faedfa3d1af4633987cd692678
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleFileNameA
FindClose
CopyFileA
CloseHandle
FindFirstFileA
LoadLibraryA
DeleteFileA
GetCurrentDirectoryA
ExitProcess
GetProcAddress
CreateFileA
SetCurrentDirectoryA
ReadFile
Sleep
FindNextFileA
VirtualAlloc
VirtualFree
lstrcatA
lstrlenA
GetFileSize
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ws2_32
recv
gethostname
gethostbyname
connect
closesocket
WSAStartup
send
WSACleanup
socket
Sections
CODE Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE