Static task
static1
Behavioral task
behavioral1
Sample
88b34871d384c4767da244abe919813963469762b4e19d929a6a1263f02ee3d2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
88b34871d384c4767da244abe919813963469762b4e19d929a6a1263f02ee3d2.exe
Resource
win10v2004-20240412-en
General
-
Target
88b34871d384c4767da244abe919813963469762b4e19d929a6a1263f02ee3d2
-
Size
1.5MB
-
MD5
c29d3dd3e01583e9718c18524eb8ab69
-
SHA1
b9c7f1b035c6b4b18395ca9ed5dbb9b5c1ec17bf
-
SHA256
88b34871d384c4767da244abe919813963469762b4e19d929a6a1263f02ee3d2
-
SHA512
ab9ccbbb3c0d7bd8b46942470bcc8e4a76ff939b70dd6baf3e01489606de0dfc888ca88d76d92262faabe25d6e2ac873845cd6db815bc24486bbd5fa5ea62b55
-
SSDEEP
6144:p0aJ41z7pmJyseEgKgPObOIozhRjcerTnq:p0aqz79QiI4Tq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88b34871d384c4767da244abe919813963469762b4e19d929a6a1263f02ee3d2
Files
-
88b34871d384c4767da244abe919813963469762b4e19d929a6a1263f02ee3d2.exe windows:4 windows x86 arch:x86
a606d6d193682c88456990bb5b2cb89a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetOEMCP
Sleep
GetStringTypeA
GetStringTypeW
ReadFile
LCMapStringA
LCMapStringW
SetStdHandle
SetFilePointer
FlushFileBuffers
CloseHandle
lstrlenA
LocalFree
lstrcpynA
LocalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GetCPInfo
GlobalAlloc
LocalReAlloc
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
GetProcessVersion
lstrcmpA
GlobalFlags
InterlockedExchange
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
RaiseException
GetProcessHeap
IsBadReadPtr
FreeLibrary
LoadLibraryA
GlobalReAlloc
GetProcAddress
user32
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
SetWindowTextA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
DestroyMenu
TabbedTextOutA
GrayStringA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
GetCapture
GetDlgItem
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
WinHelpA
CheckMenuItem
comctl32
ord17
gdi32
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
CreateBitmap
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ