Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp
-
Size
921KB
-
MD5
2c02d06832802ad67b52fba9f552a2ba
-
SHA1
e71e74c372b3c13ee6854832e1f39599c056fc78
-
SHA256
4e122642bfb61c49997026b310f1e614e649a2185b3409abb15551b58a26659d
-
SHA512
f4249171c281b77c4bfa8c72deb84ba71a9a5aec36ce5281697c58a0bd6c76ed2d5e0fbae5dd4a96e7e535345fe0ec7e33878651af478c360d4f136b0b92b3c1
-
SSDEEP
24576:N142MqimmrQejKk8v4iCgi7aCYEhNCuDQZHGOhjQHXzWoRq:M2MqUiriGCYEhNCuD0hS1
Malware Config
Signatures
Files
-
tmp.exe windows x64
dfb45efa66ccee9f91b31195f15467d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
strrchr
memcmp
__chkstk
strcmp
wcslen
memset
strncpy
strncmp
strlen
strcpy
strcat
strstr
memcpy
kernel32
GetCurrentProcess
GetCurrentThread
GetModuleHandleA
GetProcAddress
LoadLibraryA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
MultiByteToWideChar
Sleep
GetLastError
CloseHandle
GetTickCount64
gdi32
CreatePen
GetDIBits
GetDeviceCaps
TextOutW
MoveToEx
SetTextColor
StretchDIBits
SetBkMode
SetBkColor
SelectObject
Rectangle
LineTo
DeleteObject
DeleteDC
CreateFontW
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateSolidBrush
Sections
.text Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ