Static task
static1
Behavioral task
behavioral1
Sample
tmp7918.tmp.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
tmp7918.tmp.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
tmp7918.tmp.exe
Resource
win11-20240709-en
General
-
Target
tmp7918.tmp.exe
-
Size
199KB
-
MD5
e52cc2607b5c4f6cac091f671968b3ed
-
SHA1
96f5b2a9850862b8e4da5b4ebff69390284567de
-
SHA256
507e5c7af00ae92537f782f9be70a9672260ebc222a07d744eb9d174d2f8fa1a
-
SHA512
2c7c9ef809b71a1c45c0e05e513e8c509b195b1ea6c2edb13977b1ae5f9ec3a16d2e3fdb09de8882b6e716166653669b914a927f4440b12dfc540257011fa0ec
-
SSDEEP
6144:EOQrB8badoDqS1qfCuTBFXEiwFaa387PBRAEKrxWbJG6jDx6:FuB8badqqRfCeB6ip7PfRCj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp7918.tmp.exe
Files
-
tmp7918.tmp.exe.exe windows:6 windows x64 arch:x64
d11bf51982726d912fe5a503fb410fc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetProcessHeap
CreateFileA
CloseHandle
HeapCreate
TryEnterCriticalSection
FindFirstFileA
FindNextFileA
GetCurrentThreadId
GetStdHandle
CreateFileMappingA
ExitProcess
VirtualAlloc
GetLocalTime
HeapLock
opengl32
glNewList
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ