Static task
static1
Behavioral task
behavioral1
Sample
DTM9 (4).exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
DTM9 (4).exe
Resource
win10v2004-20240709-en
General
-
Target
DTM9 (4).exe
-
Size
28.1MB
-
MD5
947d8ca0b4e65d167ecbf00728f73256
-
SHA1
c981139269e56ad6058d793826dd69caa70f2097
-
SHA256
d126e8d3cdff8cf62f043dd7fe7c2506e9b7f1fc916ead821bb7184d63f251be
-
SHA512
e11008a8f8af96ac031664804ec8f99142bbd286be1e3b9ccb6feff4ad821eb48a46bfd3c77c9adddf75a5e373afbe937e7e0ad98cc856c018b9f6df0d3c979a
-
SSDEEP
393216:IVe9bZmE4YKbZmEIjPbZmET7IbZmE77ybZmEl2wbZmEpn8ibZmEMSYbZmEecJbZ3:IVe2Wn8c/8BG94PJEuqyeLNCz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DTM9 (4).exe
Files
-
DTM9 (4).exe.exe windows:4 windows x64 arch:x64
879fe2b6cfa08e91cf3418269786d19a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
slwga
SLIsGenuineLocal
advapi32
EnumServicesStatusExA
GetServiceDisplayNameA
GetServiceKeyNameA
GetUserNameA
OpenSCManagerA
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
IcmpCreateFile
IcmpSendEcho
kernel32
AddVectoredExceptionHandler
Beep
CheckRemoteDebuggerPresent
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
CreateThread
CreateTimerQueue
CreateTimerQueueTimer
CreateToolhelp32Snapshot
CreateWaitableTimerA
DebugActiveProcess
DebugActiveProcessStop
DebugBreak
DeleteCriticalSection
DeleteTimerQueue
DeviceIoControl
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FormatMessageA
GenerateConsoleCtrlEvent
GetBinaryTypeA
GetCommandLineA
GetComputerNameA
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDiskFreeSpaceExA
GetDriveTypeA
GetEnvironmentVariableA
GetExitCodeProcess
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetSystemFirmwareTable
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetThreadContext
GetTickCount
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersionExA
GetVolumeInformationA
GetWriteWatch
GlobalGetAtomNameA
GlobalMemoryStatusEx
HeapAlloc
HeapQueryInformation
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
IsProcessorFeaturePresent
K32EnumDeviceDrivers
K32EnumProcessModules
K32EnumProcesses
K32GetDeviceDriverBaseNameA
K32GetModuleBaseNameA
K32GetProcessImageFileNameA
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LocalSize
MultiByteToWideChar
OpenMutexA
OpenProcess
Process32First
Process32Next
QueryFullProcessImageNameA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadProcessMemory
ResetWriteWatch
SetConsoleCtrlHandler
SetConsoleTextAttribute
SetEvent
SetHandleInformation
SetLastError
SetThreadContext
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
TlsGetValue
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
lstrcmpiA
lstrlenA
mpr
WNetGetProviderNameA
msi
MsiEnumProductsA
MsiGetProductInfoA
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_beginthreadex
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_mktime64
_snwprintf
_stricmp
_stricmp
_strnicmp
_time64
_unlock
_vscprintf
_vsnprintf
_vsnwprintf
difftime
iswctype
abort
calloc
exit
fclose
fflush
fgetwc
fopen
fprintf
fputc
free
fwrite
getc
getenv
localeconv
malloc
memcmp
memcpy
memset
puts
realloc
signal
strcat
strcpy
strerror
strlen
strncat
strncmp
strrchr
strstr
system
tolower
toupper
towlower
ungetwc
vfprintf
wcscat_s
wcscmp
wcscpy_s
wcslen
wcstol
wcstoul
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
SysFreeString
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
shell32
SHGetFolderPathW
StrStrIA
user32
BlockInput
CallNextHookEx
CreateDesktopA
DispatchMessageA
EnumDisplayMonitors
EnumDisplaySettingsA
EnumWindows
FindWindowA
GetAsyncKeyState
GetCursorPos
GetDesktopWindow
GetForegroundWindow
GetKeyboardLayout
GetKeyboardLayoutList
GetLastInputInfo
GetMessageA
GetMonitorInfoA
GetShellWindow
GetSystemMetrics
GetWindowRect
GetWindowThreadProcessId
KillTimer
MessageBoxA
PostQuitMessage
SetTimer
SetWindowsHookExA
SwitchDesktop
TranslateMessage
UnhookWindowsHookEx
winmm
timeGetSystemTime
timeGetTime
timeSetEvent
winspool.drv
EnumPrintersA
Sections
.text Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 380B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/97 Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/113 Size: 26.9MB - Virtual size: 26.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/126 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ