Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp
-
Size
978KB
-
MD5
2fcf9ef7f2458b9b5eab9a773a739f17
-
SHA1
3180fba210ff76518c5664061d92473c21f8e1f8
-
SHA256
e8f2c929e1b84a389fede03bff9a4ee951cf563a64809b06f2f76201536fddf7
-
SHA512
41da2376c3d032dcd0a44d2641ca5fad12c7cb4b53616f15b57a3ce32edc9b8458218a4959dda542269d34bb5cb86a709620c3e99be5ffac9146900ba43b9c42
-
SSDEEP
24576:VIzSg+yaQa+aMaGars4PYnPb62n83ax4L20rXgQeQ4Q5Q9UXg76hAd0bcj9Z:0STyaQa+aMaGars4PYnTz8qx4a0rXgQO
Malware Config
Signatures
Files
-
tmp.exe windows x64
40520e0a3442246216ddbcb9f1188c56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
RegisterClassExA
CreateWindowExA
DestroyWindow
CharUpperBuffA
UnregisterClassA
DrawIconEx
CharUpperBuffW
GetCursorInfo
GetIconInfo
CopyIcon
DefWindowProcW
MessageBoxA
GetDC
SetForegroundWindow
kernel32
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetProcAddress
LoadLibraryA
GetCommandLineW
GetCurrentDirectoryW
CreateDirectoryA
CreateFileA
FindFirstFileW
FindNextFileW
FlushFileBuffers
GetDriveTypeW
GetFileAttributesW
SetFileAttributesW
SetFilePointer
WriteFile
OutputDebugStringA
CloseHandle
DuplicateHandle
GetLastError
DisconnectNamedPipe
HeapCreate
HeapAlloc
HeapFree
CreateMutexW
CreateFileW
GetExitCodeProcess
SwitchToThread
GetCurrentThread
GetCurrentThreadId
SetThreadPriority
GetProcessId
GetSystemInfo
GetSystemTimeAsFileTime
GetLocalTime
GetTickCount
GetWindowsDirectoryW
GetVersionExA
VirtualAlloc
VirtualProtect
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
LoadLibraryW
LocalAlloc
FormatMessageA
lstrcmpA
lstrcmpiA
lstrcmpiW
lstrcpynA
lstrcpynW
lstrcpyW
lstrcatA
lstrcatW
lstrlenA
lstrlenW
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetCurrentProcessId
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetACP
IsValidCodePage
FindFirstFileExW
FindClose
LCMapStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
ExitProcess
OutputDebugStringW
advapi32
CloseEventLog
shell32
CommandLineToArgvW
SHCreateProcessAsUserW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
HWND_UserMarshal
oleaut32
BSTR_UserFree
Sections
.text Size: 768KB - Virtual size: 767KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ