Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
General
-
Target
tmp
-
Size
10.7MB
-
MD5
d101458db03951448efd0005c536b585
-
SHA1
18c74762c3b10fadeba56e7c7145a841ccbd7de7
-
SHA256
a8c5e153bc81e01e7a6526a9a475d66b59e55efa72e2499188da538c199d195a
-
SHA512
3a4b08a7928b96f5142df6e02a61f731771f19761e3372b420962f0478c4ceb0847e240c101d220e377389a6f7a7f6227040a33f5569c57ff022c37bb15e32fd
-
SSDEEP
196608:sM9R73X1CjdWjS/FDGnymYYQVt/Fm8F8TRb:pn1EgjS/h/mYYQVt/Fm8F8TR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:6 windows x64 arch:x64
b0e4f750d383cc324d86307ca624f4d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
sas
SendSAS
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateSessionsA
WTSFreeMemory
kernel32
LocalFree
GetExitCodeProcess
ConnectNamedPipe
LocalAlloc
CreateFileW
FlushFileBuffers
OpenProcess
GetCurrentProcess
CreateDirectoryW
WTSGetActiveConsoleSessionId
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
QueueUserAPC
ResumeThread
GetModuleHandleExA
GetCurrentThreadId
CopyFileExW
GetLogicalProcessorInformation
GetSystemInfo
SetFilePointerEx
GlobalLock
GlobalSize
GlobalUnlock
WaitForSingleObject
MultiByteToWideChar
GlobalAlloc
GlobalFree
GetUserDefaultLocaleName
TerminateProcess
SetConsoleMode
CreateSemaphoreA
SetConsoleCtrlHandler
QueryPerformanceFrequency
GetModuleHandleW
GetQueuedCompletionStatusEx
SetLastError
GetFinalPathNameByHandleW
TryAcquireSRWLockExclusive
PostQueuedCompletionStatus
ReadFile
GetOverlappedResult
WriteFile
CancelIoEx
CreateIoCompletionPort
SetFileCompletionNotificationModes
CreateNamedPipeW
LoadLibraryA
FreeLibrary
LoadLibraryExA
CreateFileMappingW
MapViewOfFile
OpenFileMappingW
GetCurrentThread
WriteConsoleW
GetCurrentDirectoryW
WaitForSingleObjectEx
CreateMutexA
ReleaseMutex
GetEnvironmentVariableW
RtlLookupFunctionEntry
SetEnvironmentVariableW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
GetFileInformationByHandle
GetFullPathNameW
FindNextFileW
FindFirstFileW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
CreateThread
ReadFileEx
SleepEx
WriteFileEx
GetCurrentProcessId
CreateEventW
CancelIo
ExitProcess
GetSystemTimeAsFileTime
RtlCaptureContext
MoveFileExW
CreateSymbolicLinkW
SetHandleInformation
SetThreadErrorMode
LoadLibraryExW
GetComputerNameExW
VirtualQuery
ProcessIdToSessionId
RemoveDirectoryW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
RtlVirtualUnwind
GetFileSize
GetFileTime
SetFilePointer
ResetEvent
InitializeCriticalSectionEx
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WakeConditionVariable
SleepConditionVariableCS
InitializeConditionVariable
TryEnterCriticalSection
WakeAllConditionVariable
SetThreadPriority
InitializeCriticalSection
FindClose
FindFirstFileExW
GetFileSizeEx
GetConsoleOutputCP
ReadConsoleW
OutputDebugStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceCounter
DeleteFileW
FormatMessageW
lstrlenW
ReleaseSemaphore
WaitForMultipleObjectsEx
SetEvent
SwitchToThread
CreateEventA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTimeZoneInformation
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileInformationByHandleEx
GetConsoleMode
GetStdHandle
Sleep
HeapReAlloc
GetLastError
SetThreadStackGuarantee
AddVectoredExceptionHandler
CloseHandle
HeapFree
ReleaseSRWLockShared
AcquireSRWLockShared
GetCommandLineA
GetFileType
GetModuleHandleExW
HeapAlloc
FreeLibraryAndExitThread
ExitThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
WideCharToMultiByte
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
UnmapViewOfFile
SetFileTime
GetLogicalDrives
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
SetStdHandle
HeapSize
WaitForMultipleObjects
SetEndOfFile
ole32
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeEx
PropVariantClear
OleInitialize
OleUninitialize
OleSetClipboard
OleIsCurrentClipboard
ReleaseStgMedium
OleGetClipboard
advapi32
CreateProcessAsUserW
RegisterServiceCtrlHandlerExW
SetServiceStatus
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
FreeSid
SetSecurityDescriptorDacl
RegOpenKeyExW
CreateProcessWithTokenW
ImpersonateLoggedOnUser
DuplicateTokenEx
EqualSid
AdjustTokenPrivileges
LookupPrivilegeValueW
SystemFunction036
CreateProcessWithLogonW
StartServiceCtrlDispatcherW
GetTokenInformation
OpenProcessToken
CloseServiceHandle
OpenServiceW
OpenSCManagerW
GetUserNameW
RegCloseKey
RegQueryValueExW
user32
SendMessageW
CreatePopupMenu
AppendMenuW
DestroyMenu
RegisterWindowMessageA
GetWindowLongPtrW
PostMessageW
SetForegroundWindow
TrackPopupMenu
DefWindowProcW
GetRawInputData
ValidateRect
PeekMessageW
PostThreadMessageW
GetUpdateRect
MsgWaitForMultipleObjectsEx
AttachThreadInput
GetKeyboardState
ToUnicodeEx
DestroyWindow
EnumDisplayDevicesW
EnumDisplaySettingsExW
ExitWindowsEx
MapVirtualKeyA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetThreadDesktop
GetUserObjectInformationA
PeekMessageA
SendMessageA
PostMessageA
GetAsyncKeyState
InvalidateRgn
SetClipboardViewer
ChangeClipboardChain
RegisterClipboardFormatA
RegisterClipboardFormatW
CountClipboardFormats
EnumClipboardFormats
GetClipboardFormatNameA
SetWindowPos
SetWindowTextW
ShowWindow
GetMessageW
DispatchMessageW
OpenClipboard
SendInput
GetForegroundWindow
GetWindowThreadProcessId
CopyIcon
DestroyIcon
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
RegisterRawInputDevices
SetWindowLongPtrW
CreateWindowExW
RegisterClassExW
BlockInput
SetClipboardData
EmptyClipboard
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
GetKeyboardLayout
MapVirtualKeyExW
VkKeyScanExW
GetKeyState
GetSystemMetrics
GetMenu
GetWindowLongW
AdjustWindowRectEx
RedrawWindow
GetClipboardOwner
RegisterClassW
TranslateMessage
LockWorkStation
GetCursorInfo
PostThreadMessageA
FindWindowA
DefWindowProcA
SetWindowsHookExA
GetMessageA
DispatchMessageA
UnhookWindowsHookEx
CallNextHookEx
LoadCursorA
RegisterClassExA
CreateWindowExA
FindWindowExA
GetCursorPos
GetIconInfo
GetDC
ReleaseDC
bcrypt
BCryptGenRandom
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
d3d11
D3D11CreateDevice
dxgi
CreateDXGIFactory1
gdi32
DeleteObject
GetDIBits
BitBlt
CreateCompatibleBitmap
CreateDCW
CreateCompatibleDC
GetBitmapBits
SelectObject
DeleteDC
GetObjectA
iphlpapi
SendARP
GetAdaptersAddresses
ntdll
NtDeviceIoControlFile
RtlNtStatusToDosError
NtCancelIoFileEx
NtCreateFile
shell32
Shell_NotifyIconW
ShellExecuteW
SHGetKnownFolderPath
SHAddToRecentDocs
ShellExecuteExW
winmm
timeEndPeriod
timeGetDevCaps
timeBeginPeriod
ws2_32
WSASend
recv
getpeername
recvfrom
getsockname
getaddrinfo
WSASocketW
WSACleanup
sendto
accept
listen
ioctlsocket
socket
getsockopt
shutdown
WSAGetLastError
connect
closesocket
bind
setsockopt
send
WSAStartup
WSAIoctl
freeaddrinfo
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 7.6MB - Virtual size: 7.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ