Static task
static1
Behavioral task
behavioral1
Sample
88a6044d73ae62bfb367ef4da833f260dd83d2b027c360f783a49e6a1efc2a8a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88a6044d73ae62bfb367ef4da833f260dd83d2b027c360f783a49e6a1efc2a8a.exe
Resource
win10v2004-20240802-en
General
-
Target
88a6044d73ae62bfb367ef4da833f260dd83d2b027c360f783a49e6a1efc2a8a
-
Size
1.1MB
-
MD5
1ba81eb7813da991a83e2b23d010066b
-
SHA1
5e947e079a0fc73a48f8146ab90252b7a82152ef
-
SHA256
88a6044d73ae62bfb367ef4da833f260dd83d2b027c360f783a49e6a1efc2a8a
-
SHA512
b79d397dbd802a568ea44884b3f9155d36844a0ac41af8479cbfe90881a6a98e8f548f8c9c41fbf9d61071f4a7901ecb47e8f4676f3409b7dd9f5abe87e261f9
-
SSDEEP
12288:+lTyQjxasvpFwLz9xy5f3N2YuvEA+OD+PV7BJkjVL:+lOi4sT5F2YE+r7Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88a6044d73ae62bfb367ef4da833f260dd83d2b027c360f783a49e6a1efc2a8a
Files
-
88a6044d73ae62bfb367ef4da833f260dd83d2b027c360f783a49e6a1efc2a8a.exe windows:6 windows x86 arch:x86
299e73edf34e003bdeb1c84fdc5f7a40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DecodePointer
LoadLibraryExW
MultiByteToWideChar
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
SetLastError
RaiseException
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionEx
ReadConsoleW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetACP
DeleteCriticalSection
ReadFile
CloseHandle
GetStartupInfoW
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
GetModuleFileNameW
SetProcessShutdownParameters
WaitForSingleObjectEx
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
GetStringTypeW
IsDebuggerPresent
LoadLibraryExA
VirtualFree
GetCurrentProcess
LocalFree
GetPrivateProfileStringW
OutputDebugStringW
GetVersionExW
GetVersion
GetTickCount
GetNativeSystemInfo
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
Sleep
lstrlenA
GetThreadLocale
SetThreadLocale
CreateFileW
GetFileSize
DeviceIoControl
lstrcmpA
GetSystemInfo
WriteFile
SetFilePointer
DeleteFileW
GetFileAttributesExW
SetFileAttributesW
lstrlenW
MoveFileExW
WaitForSingleObject
ResetEvent
SetEvent
PostQueuedCompletionStatus
GetExitCodeThread
TerminateThread
CreateEventW
CreateIoCompletionPort
InterlockedExchange
GetQueuedCompletionStatus
FindNextFileW
FindClose
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
user32
DefWindowProcW
IsWindow
DestroyWindow
ShowWindow
UnregisterClassW
RegisterClassExW
GetClassInfoExW
LoadCursorW
SetTimer
KillTimer
PostMessageW
CreateWindowExW
SetWindowLongW
GetWindowLongW
CallWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
advapi32
RegOpenKeyExW
GetUserNameW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
CloseServiceHandle
CreateServiceW
OpenSCManagerW
RegQueryValueExW
ole32
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
CoInitializeSecurity
CoInitialize
oleaut32
SysAllocString
VariantInit
VariantClear
SysStringLen
LoadRegTypeLi
VarUI4FromStr
SysFreeString
LoadTypeLi
shlwapi
PathAppendW
PathFileExistsW
SHDeleteValueW
SHGetValueW
PathCombineW
PathIsDirectoryW
PathSearchAndQualifyW
PathFindFileNameW
PathRemoveFileSpecW
crypt32
CryptBinaryToStringW
CryptStringToBinaryW
wininet
InternetSetOptionW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetOpenW
netapi32
Netbios
iphlpapi
GetIpAddrTable
GetAdaptersInfo
secur32
GetUserNameExW
shell32
ord165
SHCreateDirectoryExW
SHGetSpecialFolderPathW
Sections
.text Size: 366KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 597KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ