Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_3be68fd4763016d248b3285e4174867c_tuga.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-06_3be68fd4763016d248b3285e4174867c_tuga.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-06_3be68fd4763016d248b3285e4174867c_tuga
-
Size
1.5MB
-
MD5
3be68fd4763016d248b3285e4174867c
-
SHA1
17aef9f5cb1319d38c6c85e41f1480d451f9c8f3
-
SHA256
29a25c1b26762a3386cddf7b5934c7d3f4c6d62a16c883f4bafc336b1e3088b8
-
SHA512
636e8d734dcfba1fabf7371a3940297a65b79b0e65c14d96ee727ed5930693830ffd6eeafa173318d6964815324ab454e0a0f015b32db9a5c89295e090297a0e
-
SSDEEP
24576:YaQ/xSmjaZbU034KGg3Fdzo8zqXUyInFXJGiw:Y5/xE1U0oTyloBQsi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-06_3be68fd4763016d248b3285e4174867c_tuga
Files
-
2024-06-06_3be68fd4763016d248b3285e4174867c_tuga.exe windows:6 windows x64 arch:x64
6fc00b76b3d586be40d0d493d054b158
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
IsDebuggerPresent
CheckRemoteDebuggerPresent
CreateFileA
DeleteFileA
GetLogicalDriveStringsA
GetFileSize
GetDiskFreeSpaceExA
MoveFileW
MultiByteToWideChar
SizeofResource
WriteFile
CreateFileW
GetLocaleInfoA
LockResource
GlobalAlloc
GlobalFree
GetSystemInfo
HeapAlloc
LoadResource
FindResourceW
SetFileAttributesA
GlobalLock
VerSetConditionMask
GetComputerNameW
SystemTimeToFileTime
GlobalMemoryStatusEx
VerifyVersionInfoW
GetSystemTime
GlobalUnlock
CreateMutexA
Sleep
SetEndOfFile
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapSetInformation
CloseHandle
HeapReAlloc
GetLastError
CreateToolhelp32Snapshot
HeapSize
LeaveCriticalSection
InitializeCriticalSectionEx
TerminateProcess
GetCurrentProcess
EnterCriticalSection
HeapFree
FindResourceExW
VirtualProtect
CreatePipe
ReadConsoleW
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetFilePointerEx
GetFileSizeEx
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
MoveFileExW
DeleteFileW
RemoveDirectoryW
SetEnvironmentVariableW
ExitProcess
CreateProcessW
DuplicateHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlPcToFileHeader
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
Thread32First
Thread32Next
VirtualAlloc
VirtualFree
VirtualQuery
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
LocalFree
FormatMessageA
GetLocaleInfoEx
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
WideCharToMultiByte
WaitForSingleObjectEx
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
LCMapStringEx
WakeAllConditionVariable
SleepConditionVariableSRW
GetStringTypeW
GetCPInfo
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
OutputDebugStringW
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
RtlUnwind
user32
GetWindowRect
SystemParametersInfoW
GetDC
OpenClipboard
GetDesktopWindow
EnumDisplayDevicesW
GetClipboardData
CloseClipboard
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GetDIBits
GetObjectW
DeleteObject
DeleteDC
advapi32
GetUserNameW
GetCurrentHwProfileW
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysStringLen
VariantClear
SysAllocString
shlwapi
PathFindExtensionW
gdiplus
GdipSaveImageToFile
GdiplusShutdown
GdipDrawImageI
GdipCreateBitmapFromScan0
GdipGetImageWidth
GdipGetImagePalette
GdipDeleteGraphics
GdipGetImageEncodersSize
GdipGetImageGraphicsContext
GdiplusStartup
GdipGetImageHeight
GdipGetImageEncoders
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapLockBits
GdipFree
GdipGetImagePixelFormat
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipBitmapUnlockBits
GdipCreateBitmapFromFile
urlmon
URLDownloadToFileA
Sections
.text Size: 822KB - Virtual size: 822KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 450KB - Virtual size: 449KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ