Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp
-
Size
364KB
-
MD5
624053fd08cbbd4b037d42abf3bebccf
-
SHA1
9cc34928b43ea6fd5e391f0bcb07c2f1e2c705f0
-
SHA256
232a7888f79f09c47258df130cbf4e854c7a5e0af0a534e5d918bbe7b4a9cd5a
-
SHA512
0d834442875d8dc5a662d6a722cb46fe6f9e1501fa59993c379a34551c5d8c65c16fd156e3b3d02b55cc7eb451ffd5f8f0d11cfb84042c522f2c21ac9acecde6
-
SSDEEP
6144:1IlO3QxkS7Vhc6l3qbPar3jriFa5gMfSuK+yJXsnGqgHt56b2:iqQxDpq6l3qbParyFa5/SVlvq5K
Malware Config
Signatures
Files
-
tmp.exe windows x86
401e7473d32c1cf7f86ff84ea2c539c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetNamedPipeHandleStateW
GetQueuedCompletionStatus
FillConsoleOutputCharacterW
EnumSystemCodePagesW
LocalLock
GetVolumeNameForVolumeMountPointA
GetVersionExA
VerifyVersionInfoA
WriteConsoleInputW
EnumDateFormatsW
FindNextFileA
CopyFileExW
BuildCommDCBAndTimeoutsW
VirtualLock
WriteProfileStringA
VerifyVersionInfoW
GetDriveTypeW
GetFileInformationByHandle
DeleteFileA
FindNextVolumeMountPointW
TlsGetValue
LoadResource
GetConsoleTitleW
GetComputerNameExW
OpenEventA
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
LoadLibraryA
GetShortPathNameW
ReleaseActCtx
GetCommandLineA
InterlockedExchangeAdd
InterlockedDecrement
CreateActCtxW
FindResourceA
FormatMessageW
GetModuleFileNameA
CreateJobObjectW
InitializeCriticalSection
GetNumberOfConsoleMouseButtons
FindNextVolumeA
CreateNamedPipeW
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionA
AddAtomA
InterlockedIncrement
GetVersionExW
HeapFree
_hwrite
InterlockedCompareExchange
GetStartupInfoA
ConnectNamedPipe
GetCPInfoExW
GetSystemWow64DirectoryW
GetLastError
GetPrivateProfileIntW
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetTickCount
VirtualQueryEx
OpenFileMappingA
GetModuleHandleW
GetDefaultCommConfigA
VirtualAlloc
TerminateProcess
GetACP
GetDiskFreeSpaceExA
EnumResourceTypesA
IsProcessInJob
lstrcpynW
WriteConsoleW
GetProcAddress
lstrcatA
LoadLibraryW
ReadConsoleOutputA
GetStartupInfoW
SetHandleInformation
WritePrivateProfileStructA
DeleteCriticalSection
GetFileAttributesA
DeactivateActCtx
CopyFileW
GlobalMemoryStatus
SetTapeParameters
GetDevicePowerState
ResetEvent
LockFile
MoveFileW
DisableThreadLibraryCalls
GetOverlappedResult
GetCommTimeouts
FormatMessageA
GlobalAlloc
SetThreadPriorityBoost
SetFileShortNameW
GetFileAttributesW
SetCalendarInfoA
ConvertFiberToThread
GetConsoleTitleA
SetComputerNameA
GetConsoleAliasesW
EnumDateFormatsA
SetTimeZoneInformation
SetConsoleOutputCP
MoveFileWithProgressW
GetStdHandle
GetLocalTime
EnumSystemLocalesW
ActivateActCtx
CreateMemoryResourceNotification
OpenSemaphoreA
GetModuleHandleExA
AddAtomW
FoldStringW
_hread
GetFileSize
SetUnhandledExceptionFilter
GetConsoleAliasesLengthA
SetProcessShutdownParameters
lstrcpynA
GlobalUnWire
GetCompressedFileSizeA
ReadConsoleA
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
TerminateJobObject
CreateFileA
SetTimerQueueTimer
SetLastError
UnhandledExceptionFilter
RaiseException
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
SetFilePointer
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
ExitProcess
SetHandleCount
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CloseHandle
user32
CharUpperA
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pudupi Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.din Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vaze Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ducu Size: 512B - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ