Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp
-
Size
285KB
-
MD5
4ef9b9476a49188c724f15011e1de0e5
-
SHA1
4a53146f8064fccad67ce32feeec86d7f192992d
-
SHA256
ac4fb93fe8680b245a6994594bcc4e5d539d645ad7011772401b7d8c71fd0596
-
SHA512
244e7e1fd456964b2379faa0151a57742a4e9bccb4d709c1bd44ddcb94d74a47489df970952bc837748ccecb2e18941481dcfc77c88dadcda2188b86e6227362
-
SSDEEP
6144:b/NUa4WuhGf7kXf2N+jUlfoCbOblsUJI+5HYjWj9:bStW4GzEfaxpabip+5f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:5 windows x86 arch:x86
4dcf0786e9c95a11a0ec45176eff4aa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
WriteConsoleOutputCharacterW
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
OpenJobObjectA
GetComputerNameW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
WriteFile
LoadLibraryW
WriteConsoleOutputA
HeapDestroy
GetTimeZoneInformation
ReplaceFileA
FlushFileBuffers
CreateDirectoryA
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
GetProcAddress
CreateNamedPipeA
ResetEvent
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
AddAtomW
VirtualProtect
EnumDateFormatsW
CompareStringA
FatalAppExitA
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
ExitProcess
DecodePointer
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
RaiseException
GetUserDefaultLCID
IsValidLocale
user32
GetClassLongA
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tidig Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tamej Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zutulo Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ