Static task
static1
Behavioral task
behavioral1
Sample
Krunker.io-Hacks-Cheats-Tampermon-Script_691347.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Krunker.io-Hacks-Cheats-Tampermon-Script_691347.exe
Resource
win10v2004-20240802-en
General
-
Target
Krunker.io-Hacks-Cheats-Tampermon-Script_691347.exe
-
Size
18.6MB
-
MD5
bc86eed909bb8a984bf478dfd70a5276
-
SHA1
17cce5077da10a9bdf1e60b192d1568e54b58de6
-
SHA256
efeacb8161d4c91726ccbe2e731e67e7a55a4b66be9921517365aad760011d65
-
SHA512
b6e4f07f3a68419dd21cd7d27db43af5b2b7069bf1f8df7b2d8f0e6a05c27a122a91479fa38111836a185e99c70e107014bbb4507e94f4f3ba5b20af6096b1d8
-
SSDEEP
393216:IcW23WGWcqJuuCJuuBy3QYDez3QzCQSPIaXSz69II65rUV8:IuqJuuCJuuI3ivhdS+9Ix5rUV8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Krunker.io-Hacks-Cheats-Tampermon-Script_691347.exe
Files
-
Krunker.io-Hacks-Cheats-Tampermon-Script_691347.exe.exe windows:6 windows x86 arch:x86
dd99b1d4724b2a330fd30cc96c3445eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
kernel32
SetCurrentDirectoryA
CreateFileW
GetModuleHandleA
SetStdHandle
GetLocaleInfoW
SetFileTime
GetSystemDirectoryW
WaitForSingleObject
GetFileAttributesW
HeapSize
GetFileInformationByHandle
LoadLibraryW
GetFullPathNameW
CreateDirectoryA
IsValidLocale
TryAcquireSRWLockExclusive
FreeLibraryAndExitThread
InitializeCriticalSection
SetEnvironmentVariableA
GetCurrentProcessId
FileTimeToSystemTime
TlsFree
ReadFile
lstrlenA
WideCharToMultiByte
SetFilePointer
GetSystemTimeAsFileTime
CreateThread
GetStdHandle
LoadLibraryExW
GetLocaleInfoEx
LocalFree
VirtualAlloc
GetVersionExA
TlsSetValue
GetUserDefaultLCID
GetTempPathW
UnhandledExceptionFilter
FreeLibrary
DeleteFileW
ResetEvent
DeleteFileA
FindFirstFileA
SystemTimeToTzSpecificLocalTime
FindFirstFileW
GetLastError
GetSystemInfo
ExitThread
QueryPerformanceCounter
GetTimeZoneInformation
FlushFileBuffers
SetFilePointerEx
TlsAlloc
SetCurrentDirectoryW
GetFileType
InitializeSListHead
EnterCriticalSection
SleepEx
GetFinalPathNameByHandleW
EnumSystemLocalesW
GetProcessAffinityMask
GetFileSize
GetModuleHandleW
LeaveCriticalSection
CompareStringW
MoveFileExW
GetTempPathA
HeapReAlloc
LoadLibraryA
WriteConsoleW
GetProcAddress
InitializeCriticalSectionAndSpinCount
GetEnvironmentVariableA
GetFileSizeEx
SetFileAttributesW
FreeEnvironmentStringsW
AreFileApisANSI
GetCurrentDirectoryW
ReadConsoleW
VirtualFree
GetModuleFileNameW
RaiseException
RemoveDirectoryW
ExitProcess
CreateDirectoryW
EncodePointer
RemoveDirectoryA
GetModuleHandleExW
Sleep
GetCurrentProcess
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetDriveTypeW
ReleaseSemaphore
SetEvent
WaitForSingleObjectEx
GetEnvironmentStringsW
RtlUnwind
HeapAlloc
CreateEventA
LCMapStringW
TerminateProcess
DeleteCriticalSection
GetStartupInfoW
VerSetConditionMask
IsDebuggerPresent
GetACP
GetFileAttributesExW
MultiByteToWideChar
GetCurrentDirectoryA
InitializeCriticalSectionEx
FindClose
TlsGetValue
WriteFile
WaitForMultipleObjects
CreateSemaphoreA
QueryPerformanceFrequency
FormatMessageA
GetConsoleCP
LCMapStringEx
PeekNamedPipe
GetStringTypeW
GetTickCount
GetDateFormatW
GetFileAttributesA
FormatMessageW
WakeAllConditionVariable
lstrcatA
GetCommandLineA
GetCurrentThreadId
GetConsoleMode
VerifyVersionInfoW
GetOEMCP
GlobalMemoryStatus
HeapFree
FindNextFileA
GetCPInfo
IsProcessorFeaturePresent
GetTickCount64
CloseHandle
GetModuleFileNameA
GetCommandLineW
SetEndOfFile
DecodePointer
IsValidCodePage
GetVersion
FindNextFileW
CreateFileA
GetProcessHeap
SetLastError
SetFileAttributesA
FindFirstFileExA
GetTimeFormatW
SetUnhandledExceptionFilter
user32
CharUpperA
ShowWindow
DialogBoxParamA
MessageBoxW
KillTimer
CharUpperW
SendMessageA
GetWindowLongA
wsprintfA
PostMessageA
SetTimer
EndDialog
MessageBoxA
LoadStringW
LoadIconA
SetWindowLongA
LoadStringA
GetDlgItem
DialogBoxParamW
DestroyWindow
SetWindowTextA
SetWindowTextW
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
bcrypt
BCryptGenRandom
advapi32
CryptHashData
CryptCreateHash
CryptEncrypt
CryptImportKey
CryptDestroyHash
CryptDestroyKey
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
crypt32
CryptDecodeObjectEx
CertOpenStore
CryptStringToBinaryW
CertEnumCertificatesInStore
CertFindExtension
PFXImportCertStore
CertGetNameStringW
CertCloseStore
CertFreeCertificateChainEngine
CertAddCertificateContextToStore
CertFreeCertificateContext
CryptQueryObject
CertFreeCertificateChain
CertCreateCertificateChainEngine
CertGetCertificateChain
CertFindCertificateInStore
wldap32
ord216
ord301
ord145
ord219
ord46
ord14
ord147
ord73
ord208
ord41
ord117
ord26
ord27
ord127
ord167
ord142
ord79
ord133
ws2_32
gethostname
htons
getsockopt
send
WSAIoctl
WSACloseEvent
WSACreateEvent
WSAResetEvent
freeaddrinfo
WSAEventSelect
closesocket
WSAGetLastError
ntohs
WSASetLastError
WSAStartup
WSACleanup
ioctlsocket
setsockopt
getaddrinfo
__WSAFDIsSet
select
accept
bind
connect
getsockname
htonl
listen
recv
socket
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
recvfrom
sendto
getpeername
Sections
.text Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ