Static task
static1
Behavioral task
behavioral1
Sample
DTM17.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DTM17.exe
Resource
win10v2004-20230915-en
General
-
Target
DTM17.exe
-
Size
633KB
-
MD5
8b947ae7cdb43d8daf827452a176e48b
-
SHA1
cd3713fda4fcc3610a96c0485be2536759f2c3ce
-
SHA256
affd66e55d43f72fe62778024648a582eb7f12f556c18f85652227eee4b6a12d
-
SHA512
734c3d9756cab0a5e45a9aafcecadeb9f4b03691d7287abcb9cabd1b4ab0661ff9497ecad1b2d5758a0223edd81224a8f9685157cb69daa31afbc18bcd5d73c0
-
SSDEEP
12288:qfx3YP+Hdsy7Mf4F/ftIxsMAOZHWI77186O:qaP+HdsAMAF/FKVWI77q6O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DTM17.exe
Files
-
DTM17.exe.exe windows:4 windows x64
6903ae5b5d7187549c2aa6d09415c194
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
slwga
SLIsGenuineLocal
advapi32
EnumServicesStatusExA
GetServiceDisplayNameA
GetServiceKeyNameA
OpenSCManagerA
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
IcmpCreateFile
IcmpSendEcho
kernel32
AddVectoredExceptionHandler
Beep
CheckRemoteDebuggerPresent
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
CreateThread
CreateTimerQueue
CreateTimerQueueTimer
CreateToolhelp32Snapshot
CreateWaitableTimerA
DebugActiveProcess
DebugActiveProcessStop
DeleteCriticalSection
DeleteTimerQueue
DeviceIoControl
EnterCriticalSection
ExitProcess
FormatMessageA
GenerateConsoleCtrlEvent
GetBinaryTypeA
GetCommandLineA
GetComputerNameA
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDiskFreeSpaceExA
GetEnvironmentVariableA
GetExitCodeProcess
GetLastError
GetLocalTime
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetThreadContext
GetTickCount
GetVersionExA
GetWriteWatch
GlobalGetAtomNameA
GlobalMemoryStatusEx
HeapQueryInformation
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
K32EnumDeviceDrivers
K32EnumProcessModules
K32EnumProcesses
K32GetDeviceDriverBaseNameA
K32GetModuleBaseNameA
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LocalSize
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadProcessMemory
ResetWriteWatch
SetConsoleCtrlHandler
SetConsoleTextAttribute
SetEvent
SetHandleInformation
SetThreadContext
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
TlsGetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
lstrcmpiA
lstrlenA
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_beginthreadex
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_stricmp
_snwprintf
_unlock
_vscprintf
_vsnprintf
_vsnwprintf
abort
calloc
exit
fclose
fgetwc
fopen
fprintf
fputc
free
fwrite
getc
getchar
localeconv
malloc
memcmp
memcpy
memset
puts
signal
strerror
strlen
strncat
strncmp
strstr
system
vfprintf
wcscmp
wcslen
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
SysFreeString
shell32
StrStrIA
user32
BlockInput
CreateDesktopA
DispatchMessageA
FindWindowA
GetCursorPos
GetLastInputInfo
GetMessageA
GetShellWindow
GetWindowThreadProcessId
KillTimer
SetTimer
SwitchDesktop
winmm
timeGetSystemTime
timeGetTime
timeSetEvent
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/97 Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/113 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ