Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231023-en
General
-
Target
tmp
-
Size
4.9MB
-
MD5
7107ca84b21142669a90fd86e48920d1
-
SHA1
19b1f6d5a48316d298c9eecc650f11b2b2aa3fb0
-
SHA256
de289bbd4b85d9d5a243efe3b768a249436053ec66bca187afc617f9b66a0d3a
-
SHA512
5ea1d36851cd54828db540fdf162cd1f4652acb2a41955daf13f2b37024669788e60b41f8cba7cfafa25c7be9a669e2a8612a7e3ba7c4900713030e2792dc472
-
SSDEEP
98304:l1qy/W/xZZqcz23KEYc+1VsVr4oydE5eDdoUTRPefqbbMxb5k:l1qj/Vz23KE7+16VM8QKARPefq/M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:5 windows x86
27af701908ace9f691eb5b5279d4191d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
D3DXCreateVolumeTextureFromFileInMemoryEx
D3DXCreateCubeTextureFromFileInMemoryEx
D3DXCreateFontA
D3DXSaveSurfaceToFileA
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemory
d3d9
Direct3DCreate9
kernel32
FreeLibrary
CreateFileW
GetFileSize
WriteFile
ReadFile
GetFileTime
FormatMessageA
GetComputerNameA
LoadLibraryExW
GetSystemDirectoryW
LocalAlloc
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
LCMapStringW
GetOEMCP
GetACP
GetTickCount
GetLocalTime
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
CreateThread
GetCurrentThreadId
CreateFileA
GetFileAttributesA
CreateDirectoryA
FindFirstFileA
FindClose
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
SetFilePointer
DeleteFileW
MoveFileW
GetTempPathA
GetTempPathW
GetCurrentDirectoryW
InterlockedExchange
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetFullPathNameW
LocalFree
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleA
HeapReAlloc
DeleteCriticalSection
GetLastError
InterlockedIncrement
InitializeCriticalSection
LCMapStringA
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetCPInfo
GetStdHandle
SetHandleCount
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
GetModuleHandleW
GetProcessHeap
GetFileType
GetDriveTypeA
FileTimeToLocalFileTime
HeapAlloc
RaiseException
HeapFree
RtlUnwind
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
ExitThread
GetSystemInfo
GetSystemTimeAsFileTime
VirtualAlloc
VirtualFree
SetUnhandledExceptionFilter
GetCurrentProcessId
CreateToolhelp32Snapshot
Module32First
Module32Next
InterlockedDecrement
CreateFileMappingA
UnmapViewOfFile
MulDiv
DuplicateHandle
GetCurrentThread
TryEnterCriticalSection
SizeofResource
LockResource
InterlockedExchangeAdd
LoadResource
FindResourceA
SetFileAttributesA
MoveFileA
DeleteFileA
SetConsoleTitleA
AllocConsole
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentProcess
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
CreateEventA
SetEvent
OutputDebugStringA
OpenEventA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
TerminateThread
WaitForSingleObject
GetVersionExA
GetProcAddress
GlobalMemoryStatusEx
CopyFileA
GetModuleFileNameA
MultiByteToWideChar
LoadLibraryA
SetEndOfFile
MapViewOfFile
user32
SendMessageA
SetFocus
ShowCursor
GetClientRect
ClientToScreen
PostQuitMessage
PeekMessageW
GetMessageW
RegisterClassA
CreateWindowExA
GetActiveWindow
InvalidateRect
UpdateWindow
BeginPaint
EndPaint
SetClipboardViewer
ChangeClipboardChain
MessageBoxA
LoadIconA
LoadCursorA
LoadStringW
SetRect
AdjustWindowRect
GetWindowLongA
SetWindowPos
ClipCursor
ReleaseCapture
GetCursorPos
GetWindowRect
SetCapture
DefWindowProcA
SetWindowLongA
SetWindowTextA
ShowWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetCaretBlinkTime
GetFocus
GetKeyState
OpenClipboard
GetClipboardData
CloseClipboard
GetAsyncKeyState
SwitchToThisWindow
gdi32
SetTextColor
GetTextExtentPoint32A
DeleteObject
SelectObject
CreateDIBSection
SetTextAlign
SetBkColor
DeleteDC
GetDeviceCaps
CreateICA
GetStockObject
CreateFontA
CreateCompatibleDC
LineTo
MoveToEx
ExtTextOutA
CreatePen
SetMapMode
advapi32
CryptGenRandom
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
CryptAcquireContextA
CryptReleaseContext
CryptExportKey
CryptDestroyKey
CryptGetUserKey
CryptEnumProvidersA
CryptGetProvParam
CryptAcquireContextW
RegOpenKeyExA
shell32
SHGetFolderPathA
ShellExecuteA
ole32
CoCreateInstance
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysAllocString
iphlpapi
GetAdaptersInfo
dbghelp
MakeSureDirectoryPathExists
MiniDumpWriteDump
ws2_32
getsockopt
setsockopt
ioctlsocket
WSAGetLastError
socket
WSAStartup
ntohs
inet_ntoa
getsockname
gethostbyname
inet_addr
htons
connect
select
__WSAFDIsSet
bind
closesocket
shutdown
recv
send
dinput8
DirectInput8Create
crypt32
CertCreateCertificateContext
CertGetCertificateContextProperty
CryptDecodeObject
CertSetCertificateContextProperty
CertDuplicateCertificateContext
CertNameToStrW
CertEnumCertificatesInStore
CryptEncryptMessage
CryptEncodeObject
CryptDecryptMessage
CertCloseStore
CertOpenStore
CertGetSubjectCertificateFromStore
CryptMsgControl
CryptMsgGetParam
CryptMsgClose
CryptMsgUpdate
CryptMsgOpenToDecode
CertFreeCertificateContext
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 741KB - Virtual size: 741KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 782KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ