Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp
-
Size
168KB
-
MD5
db7e05593766d7ff7ec4d121fa6c85ee
-
SHA1
ea708d90e5c2e33fbf0cd7f80c2755d6cbd20902
-
SHA256
11561eed49061067598e039df6a6519da2d81d7f6904c97a303dba60bcadb769
-
SHA512
b0bec46c1348735a81a66d050dba5893f4994c958eb562f4d7669845faff1cefff0bb9571913daed52e6f459a661c05b6b2d755d2f8edad2b14b098a477693b3
-
SSDEEP
3072:+CpdQC2mC467S9EVJeMl+1FzNvqjizAg0FubppVKpKiwA:nW2SVJeMlQzvAOopFw
Malware Config
Signatures
Files
-
tmp.exe windows x86
462eb4e88d1f8c6aea6db3cdc1742714
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
GetLastError
GetCurrentDirectoryA
CreateActCtxA
ActivateActCtx
DeactivateActCtx
CreateThread
ResumeThread
OpenThread
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetModuleFileNameA
GetModuleHandleA
LockFile
UnlockFile
GetFileType
SetEndOfFile
ReleaseActCtx
CreateNamedPipeA
ConnectNamedPipe
ExitProcess
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStdHandle
GetStartupInfoW
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
LoadLibraryExW
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetACP
GetStringTypeW
DecodePointer
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
GetProcessHeap
FlushFileBuffers
GetCPInfo
IsValidCodePage
GetOEMCP
RaiseException
SetFilePointerEx
WriteConsoleW
GetModuleFileNameW
GetModuleHandleExW
ReadFile
ReadConsoleW
CreateFileW
HeapSize
HeapReAlloc
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
FindClose
FindFirstFileExW
FindNextFileW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ