C:\Users\Administrator\Desktop\Client\Temp\yvSloWqBTo\src\obj\x86\Debug\NKemSfx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
TNT Documents.exe
Resource
win7-20241010-en
General
-
Target
957ef243d645248c1c80c3b121f7290c950530d525c9a54a961be12e1c6dfdfc
-
Size
372KB
-
MD5
484f7dafd5dd5cfb402991a9c54a0b63
-
SHA1
b6588b55820e7bef09050eeacd769424cfee4afc
-
SHA256
957ef243d645248c1c80c3b121f7290c950530d525c9a54a961be12e1c6dfdfc
-
SHA512
8c5baad99cc8a2688b126742c574aa4c10bf3757f82a5e3b85e00a2ea5470148d0443aa281989c72e46797bcbe837dc02fce6ff113ff93ee27439098acef08b8
-
SSDEEP
6144:EZWAqIU52T63HMaVg4p1aTwCMKaGAKUOhOwxmvTrpxzfAMMYBLsoX2VKE4jfPn1v:qWAvCp1UMKaGNFh0rpBAM6oXtr1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack003/TNT Documents.exe
Files
-
957ef243d645248c1c80c3b121f7290c950530d525c9a54a961be12e1c6dfdfc.zip
Password: infected
-
c442b2e666ab8f99a0ad21f07f4f6f9a7675385ed1d0a4d14ba66a559b3c9338.ace
-
out.ace.ace
-
TNT Documents.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 434KB - Virtual size: 434KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ