Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp
-
Size
5.1MB
-
MD5
9a52b94bb04e696ba9bc8278a0835a4e
-
SHA1
e07ff259ceff21bd34fb44f87d437c4eb877912b
-
SHA256
2bb0a8648183be67111c63c55b6dfc5d6fdea612a6df9d6b354eba67e15de393
-
SHA512
219154764d64f850ce4ae995b52f0ef423e6a9b40dceb65ff09b02a0c647c1b77eae8e4dbe916ada0a9b0350888d2dce6220b749b158dc590630a2ed81f40998
-
SSDEEP
98304:T939azTRaaqEHyq7NQFS07bklh90V5CSwTCi+su0yXd9sqDLtYuarrz404Qlzvg7:53ITRaqSq7Wj7who5CSCCXmGd95vahrP
Malware Config
Signatures
Files
-
tmp.exe windows x64
a13eb4226f65482cea75df390d8cb121
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCommandLineA
CreateFileA
FindClose
FindFirstFileA
FindNextFileA
LockFile
CloseHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
WaitForSingleObject
ExitProcess
CreateThread
GetCurrentThread
GetCurrentThreadId
OpenThread
ResumeThread
VirtualAlloc
MapViewOfFile
GetProcAddress
CreateFileMappingA
OpenFileMappingA
LoadLibraryA
GetTempPathA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ