Static task
static1
General
-
Target
UNDERTALE.exe
-
Size
3.6MB
-
MD5
93d87952773a2bb59a8667d0bc06c2c0
-
SHA1
480c87f42e8ecbcde1104f4a61de5dee6a9cb3c5
-
SHA256
9ec41f5094544c938fc075f5506c089d0c1e11fb93afba79a196981bef81d19b
-
SHA512
d9fce47e5c037e4954437c95abea6959e39c91d0bcd596f1c3267e5c09e5a0defade4c63617609b5386879bcae06e3c60e909fcf2476e250bc960eea0c2d1c6d
-
SSDEEP
49152:LKmEDcfY7y7tinhmShHrfh/mX2KiKwmFT7MvTyA:y7K6HrfdmX2KiUFT7M2A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource UNDERTALE.exe
Files
-
UNDERTALE.exe.exe windows x86
43d27a4801bf5ae4e116665f17d52292
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetWriteFile
HttpEndRequestW
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetCrackUrlA
InternetCanonicalizeUrlA
HttpSendRequestA
InternetGetConnectedState
InternetConnectA
HttpOpenRequestA
d3dx9_43
D3DXGetVertexShaderProfile
D3DXCompileShader
D3DXGetPixelShaderProfile
D3DXCreateTextureFromFileW
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemoryEx
dbghelp
MiniDumpWriteDump
SymInitialize
SymFromAddr
winmm
mciGetErrorStringA
joyGetPos
joyGetPosEx
joyGetDevCapsA
timeGetTime
waveInGetDevCapsW
waveInGetNumDevs
waveInAddBuffer
waveInClose
waveInUnprepareHeader
waveInPrepareHeader
waveInOpen
waveInReset
waveInStart
waveInStop
mciSendStringA
ws2_32
inet_addr
WSAAddressToStringA
freeaddrinfo
select
WSAGetLastError
__WSAFDIsSet
htons
htonl
ntohs
ntohl
gethostname
closesocket
shutdown
WSAStartup
WSACleanup
getsockopt
setsockopt
ioctlsocket
socket
bind
listen
accept
recv
inet_ntoa
recvfrom
getpeername
send
connect
sendto
getaddrinfo
gdiplus
GdiplusShutdown
GdiplusStartup
comctl32
InitCommonControlsEx
kernel32
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
LCMapStringA
CreateFileA
GetFullPathNameA
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
SetFilePointer
SetStdHandle
ReadFile
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
FatalAppExitA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
WriteFile
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
SetLastError
GetStdHandle
SetHandleCount
IsDebuggerPresent
TerminateProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
CreateDirectoryA
GetFileType
PeekNamedPipe
GetFileInformationByHandle
HeapReAlloc
UnhandledExceptionFilter
FindNextFileA
GetDateFormatA
GetTimeFormatA
DeleteFileA
GetSystemTimeAsFileTime
SetFileAttributesW
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
HeapAlloc
HeapFree
DebugBreak
lstrlenA
MultiByteToWideChar
GetConsoleWindow
WideCharToMultiByte
OutputDebugStringW
FormatMessageW
GetProcAddress
LoadLibraryW
GetFullPathNameW
FreeEnvironmentStringsA
GetLastError
LocalFree
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
CreateThread
GetExitCodeThread
CloseHandle
Sleep
FreeLibrary
SetCurrentDirectoryA
LoadLibraryA
GetCurrentDirectoryA
GetExitCodeProcess
CreateProcessW
FindClose
DeleteFileW
FindNextFileW
RemoveDirectoryW
FindFirstFileW
GetFileAttributesA
GetFileAttributesW
CreateDirectoryW
GetEnvironmentVariableW
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerW
SetThreadPriority
SetPriorityClass
GetCurrentProcess
GetCurrentThread
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
GetUserDefaultLCID
GetLocaleInfoW
GetSystemInfo
GlobalMemoryStatusEx
ExpandEnvironmentStringsW
GetModuleFileNameW
MoveFileA
SetUnhandledExceptionFilter
SetErrorMode
GetCommandLineW
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsSetValue
TlsGetValue
TlsFree
ExitThread
SetEvent
CreateEventW
WaitForSingleObjectEx
RtlCaptureStackBackTrace
InterlockedExchange
RaiseException
RtlUnwind
HeapValidate
HeapWalk
GetEnvironmentStrings
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
GetProcessHeap
SetEnvironmentVariableW
GetCurrentDirectoryW
VirtualQuery
LocalAlloc
user32
CreateDialogParamW
SetWindowTextW
ScreenToClient
ReleaseDC
DrawTextW
GetDC
GetDlgItem
DialogBoxParamW
MoveWindow
ClientToScreen
GetMonitorInfoW
SetCursorPos
MapWindowPoints
GetCursorPos
wsprintfW
GetActiveWindow
DispatchMessageW
TranslateMessage
GetMessageW
EnumDisplaySettingsW
ChangeDisplaySettingsW
SetWindowLongW
UpdateWindow
EnumDisplaySettingsExW
EnumDisplayDevicesA
keybd_event
EndDialog
IsClipboardFormatAvailable
BringWindowToTop
GetClipboardData
OpenClipboard
GetFocus
SetWindowTextA
SetClipboardData
EmptyClipboard
MessageBoxA
SetDlgItemTextA
IsDialogMessageW
PeekMessageW
GetForegroundWindow
PostThreadMessageW
LoadImageW
LoadCursorW
RegisterClassExW
CreateWindowExW
SendMessageW
SetCursor
GetClientRect
GetWindowRect
DestroyWindow
PostMessageW
SetFocus
DefWindowProcW
GetDlgItemTextW
SetDlgItemTextW
GetAsyncKeyState
ShowWindow
ReleaseCapture
SetCapture
GetKeyState
CallNextHookEx
SetForegroundWindow
SetWindowPos
GetSystemMetrics
CloseClipboard
MessageBoxW
AdjustWindowRectEx
gdi32
GetDeviceCaps
CreateFontA
SelectObject
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteW
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
SysFreeString
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 820KB - Virtual size: 820KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 167KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mydata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ