Static task
static1
Behavioral task
behavioral1
Sample
Tetroxidex64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Tetroxidex64.exe
Resource
win10v2004-20230915-en
General
-
Target
Tetroxidex64.exe
-
Size
354KB
-
MD5
c943529bdd5edb94dddcacba4f706452
-
SHA1
814a78ffffb25b96466085f36e9c46668af5c1ac
-
SHA256
721555079cf8589d81fac84b398fd43d22da8f85b013ad8da7e1e17e0c16da57
-
SHA512
439680069ff4f26bb29d5d1fca66200f29bf9dc5e4cda0c102703e7bef5b4b6bc4e7d32d6e2c1833a2ef431c2d6dd05f1da5e7571bc01c20f64f861b9afcbe47
-
SSDEEP
3072:LeEuYSsW26U+p3VJvzAs59C5yazKVjb8T9W9U77UaTczQQ4ckU6hOwrbkj3q72+u:+JvzgyazKkUU7zTcOcoQ3q5GWS0i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Tetroxidex64.exe
Files
-
Tetroxidex64.exe.exe windows:5 windows x64
bd912884c62718bfaf903683c750eece
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutOpen
waveOutPrepareHeader
kernel32
GetLogicalDriveStringsW
GetExitCodeThread
Sleep
GetLastError
lstrcatW
DeleteFileW
CloseHandle
LoadLibraryW
CreateThread
GetProcAddress
LocalFree
CreateProcessW
FreeLibrary
CopyFileW
lstrcpyW
lstrcmpW
GetCurrentThreadId
HeapAlloc
GetProcessHeap
SetThreadPriority
CreateMutexW
TerminateThread
HeapFree
HeapSize
GetStringTypeW
GetFileType
SetFileAttributesW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetACP
GetModuleHandleExW
CreateFileW
WaitForSingleObject
FindClose
GetTempPathW
GetModuleFileNameW
RemoveDirectoryW
WriteFile
GetCurrentProcess
FindNextFileW
FindFirstFileW
ReadFile
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
SetStdHandle
ExitProcess
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
MultiByteToWideChar
user32
GetMessageW
DispatchMessageW
SetTimer
TranslateMessage
EnumDisplayMonitors
GetWindowRect
EnumChildWindows
GetSystemMetrics
SetWindowTextW
DrawIcon
DestroyCursor
GetCursorInfo
RedrawWindow
MoveWindow
EnumWindows
mouse_event
SetCursorPos
GetDC
MessageBoxW
ExitWindowsEx
FindWindowW
GetClientRect
ReleaseDC
gdi32
DeleteDC
CreatePen
Ellipse
DeleteObject
CreateSolidBrush
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
BitBlt
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
shell32
ShellExecuteW
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ