Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp
-
Size
4.6MB
-
MD5
58230b2728a640790d3e48b1e9ec21fd
-
SHA1
a601790be1f0b6b59a3137a4d9837ec872ef82c6
-
SHA256
516ce3d6aacca435bc5842bdf22a2fe364eaf1b87c92c620f96bc25170d6cf06
-
SHA512
7fd0f12b91456c5627a5c1e0dd6ea81055426ac4660fb090a4cd8af0d879bc8c6951af95f6d58fb1ae5a6d4d40dd1d22c6dfbafce01396f62b6c6e1074355350
-
SSDEEP
98304:RZ0oKpujBFtdoviJH+acPaTaaiaPOCYQaft4h7MzdeM:z0oK4Dx+auaTaBaXYQrH
Malware Config
Signatures
Files
-
tmp.exe windows x86
c6c052738fde2902d7f1e6ddff2bfd38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3d9
Direct3DCreate9Ex
d3dx9_43
D3DXMatrixTransformation2D
D3DXVec3Normalize
D3DXCreateTextureFromFileExA
D3DXCreateFontA
D3DXCreateSprite
D3DXCreateLine
D3DXCreateEffect
D3DXMatrixInverse
D3DXVec4Transform
D3DXMatrixMultiply
D3DXVec2Normalize
kernel32
CreateFileW
CloseHandle
WriteProcessMemory
OpenProcess
CreateToolhelp32Snapshot
FreeConsole
Module32FirstW
VirtualAllocEx
ReadProcessMemory
Module32NextW
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
DeviceIoControl
QueryPerformanceFrequency
QueryPerformanceCounter
FreeLibraryAndExitThread
CreateThread
GetModuleHandleW
K32EnumProcessModulesEx
K32GetModuleBaseNameA
K32GetModuleInformation
UnhandledExceptionFilter
GetTickCount
GetVersion
LocalAlloc
LoadLibraryA
GetSystemDirectoryA
GlobalUnlock
WriteConsoleW
HeapSize
DeleteFileW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
CreateIoCompletionPort
GetACP
IsValidCodePage
HeapReAlloc
GetTimeZoneInformation
CreatePipe
GetExitCodeProcess
WaitForSingleObject
SetStdHandle
ReadConsoleW
FlushFileBuffers
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetCommandLineW
GetCommandLineA
GetModuleFileNameW
SetConsoleCtrlHandler
GetConsoleMode
GetQueuedCompletionStatus
PostQueuedCompletionStatus
ReleaseSemaphore
CreateSemaphoreA
GetConsoleOutputCP
WriteFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
CreateProcessW
DuplicateHandle
ReadFile
ResumeThread
ExitThread
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
GetOEMCP
RtlUnwind
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
LocalFree
FormatMessageA
GetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
GetFullPathNameW
GetTempPathA
OutputDebugStringA
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetWindowsDirectoryA
GetComputerNameA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
RtlCaptureStackBackTrace
GetCurrentThreadId
GetSystemTimeAsFileTime
Sleep
GetCurrentProcess
WideCharToMultiByte
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
GetCurrentDirectoryW
CreateDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
SetEndOfFile
SetFilePointerEx
CreateEventW
AreFileApisANSI
GetFileInformationByHandleEx
MultiByteToWideChar
WaitForSingleObjectEx
RaiseException
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
InitOnceComplete
InitOnceBeginInitialize
EncodePointer
DecodePointer
LCMapStringEx
GetProcAddress
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
TerminateProcess
user32
GetKeyState
FindWindowA
GetForegroundWindow
GetCursorPos
VkKeyScanA
VkKeyScanW
GetWindowRect
SendInput
MapVirtualKeyA
GetWindowThreadProcessId
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
SetCursorPos
ReleaseCapture
GetClientRect
SetCursor
SetCapture
GetCapture
SetForegroundWindow
PostQuitMessage
UnregisterClassA
SetWindowLongW
SendMessageA
GetWindowLongW
DefWindowProcW
DestroyWindow
CreateWindowExW
RegisterClassExW
DestroyCursor
ShowWindow
GetAsyncKeyState
DispatchMessageW
DestroyIcon
PeekMessageW
MoveWindow
SetLayeredWindowAttributes
TranslateMessage
LoadIconW
LoadCursorW
ClientToScreen
gdi32
CreateSolidBrush
DeleteObject
CreateRectRgn
ws2_32
send
WSAGetLastError
bind
getsockname
getaddrinfo
htons
ntohs
setsockopt
socket
WSARecv
inet_pton
inet_ntop
connect
getsockopt
WSASetLastError
recv
WSAStartup
accept
closesocket
ioctlsocket
htonl
listen
ntohl
getservbyname
getprotobynumber
freeaddrinfo
recvfrom
sendto
select
WSAIoctl
inet_ntoa
dwmapi
DwmExtendFrameIntoClientArea
DwmEnableBlurBehindWindow
imm32
ImmGetContext
ImmSetCompositionWindow
dbghelp
SymInitialize
SymCleanup
SymSetOptions
SymFromAddr
iphlpapi
if_nametoindex
advapi32
RegCloseKey
RegQueryValueExA
CryptGenRandom
CryptAcquireContextA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 516KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ