Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240221-en
General
-
Target
tmp
-
Size
94KB
-
MD5
d3d0c69ad4c5af4fa97a3629127c2ef5
-
SHA1
ce2acbfa0da0244aa9a2ea1a2eaa124cc80ac7c0
-
SHA256
ebc532634ba06f77070040db13f2e1ba612c5623c6d01f280edac4a757767f68
-
SHA512
65b94357c999d578136846637ee726c2813084e71ddc57e891b55443c1d4e1baab6d96be9e7c5af35a8cfa063d968c66b119302bf92a55fc9dfb075c7d6f0e97
-
SSDEEP
1536:Zv6QFiwYlh1o0PSqbe3j7d0Yl7TyC9R6z8W3J7PVsuiZae/Zx2N4Yj:DFi3h1zaqi3uO7hQJ7PyHZ9/dU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:5 windows x86 arch:x86
001f79fcd3f02e15b6ce3a0f62930c1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dnsapi
DnsQuery_A
DnsFree
secur32
ApplyControlToken
InitializeSecurityContextA
DecryptMessage
EncryptMessage
AcquireCredentialsHandleW
FreeContextBuffer
QueryContextAttributesW
DeleteSecurityContext
FreeCredentialsHandle
InitializeSecurityContextW
shell32
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderPathW
wininet
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
HttpQueryInfoW
InternetQueryOptionW
InternetCloseHandle
InternetReadFile
shlwapi
PathAppendW
StrStrIA
PathAppendA
PathFindExtensionA
ws2_32
closesocket
connect
htons
send
WSAStartup
WSACleanup
inet_addr
inet_ntoa
WSAGetLastError
recv
setsockopt
ioctlsocket
select
ntohs
gethostbyname
sendto
getpeername
socket
msvcrt
strncat
isalnum
vsprintf
strrchr
toupper
strncmp
memmove
isxdigit
_strnicmp
??2@YAPAXI@Z
_snwprintf
strchr
strtok
_stricmp
_vsnprintf
_wcsnicmp
_memicmp
strncpy
sprintf
_snprintf
printf
_strcmpi
sscanf
atoi
??3@YAXPAX@Z
wcsrchr
strstr
wcsstr
memset
kernel32
GetWindowsDirectoryA
GetModuleFileNameA
OpenMutexA
GetLogicalDriveStringsA
CreateDirectoryA
GetFileSize
LockFile
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CopyFileW
FlushFileBuffers
GetLocaleInfoA
GetVolumeInformationW
lstrcatA
ExitProcess
CreateProcessW
VirtualAlloc
DeviceIoControl
SetFilePointer
lstrcpynA
LocalAlloc
LocalFree
lstrcpyW
SetFileAttributesA
DeleteFileA
lstrcpynW
lstrcatW
GetTempFileNameW
DeleteFileW
GetWindowsDirectoryW
CreateThread
InterlockedCompareExchange
GetModuleFileNameW
GetVersionExA
CreateMutexA
UnmapViewOfFile
InterlockedIncrement
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
ReleaseMutex
WaitForSingleObject
OpenProcess
CreateRemoteThread
IsWow64Process
VirtualAllocEx
VirtualFreeEx
CreateFileA
WaitForMultipleObjects
GetOverlappedResult
DisconnectNamedPipe
lstrcpyA
MoveFileExA
lstrcmpA
WideCharToMultiByte
MoveFileExW
lstrcmpW
ExitThread
MultiByteToWideChar
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
LoadLibraryW
CloseHandle
SetFileTime
CreateFileW
GetFileTime
GetSystemTimeAsFileTime
WriteFile
GetModuleHandleW
GetLastError
ReadFile
GetTickCount
HeapAlloc
GetProcessHeap
HeapFree
lstrlenA
Sleep
WriteProcessMemory
ReadProcessMemory
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
SetEvent
ConnectNamedPipe
CreateNamedPipeA
CreateEventA
user32
RegisterClassExA
CreateWindowExA
RegisterDeviceNotificationA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
wsprintfW
wvsprintfA
MessageBoxA
advapi32
RegSetValueExW
CryptDestroyHash
CryptHashData
RegOpenKeyExA
RegSetValueExA
RegNotifyChangeKeyValue
RegCreateKeyExW
CryptGetHashParam
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ