Crash
Static task
static1
Behavioral task
behavioral1
Sample
ad23c7930dae02de1ea3c6836091b5fb3c62a89bf2bcfb83b4b39ede15904910.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ad23c7930dae02de1ea3c6836091b5fb3c62a89bf2bcfb83b4b39ede15904910.exe
Resource
win10-en-20211208
General
-
Target
ad23c7930dae02de1ea3c6836091b5fb3c62a89bf2bcfb83b4b39ede15904910
-
Size
75KB
-
MD5
7a7ace486dbb046f588331a08e869d58
-
SHA1
b92149f046f00bb69de329b8457d32c24726ee00
-
SHA256
ad23c7930dae02de1ea3c6836091b5fb3c62a89bf2bcfb83b4b39ede15904910
-
SHA512
0dc9d36b727e1a79df7b60648fa35a74a9e0d705cfde274606b68d6770e2fd04e7438d09b5be6f5be135f7192114438b99246b617e64144c36b5df7fb81fbd2d
-
SSDEEP
1536:txjX3k9R4Bdde5eFN73+WmS3UJ64b69AQJRCsWmcd2jjGVjpU:jddewFVO1S3I64LwRg2jjGJK
Malware Config
Signatures
-
Industroyer Wiper Module 3 IoCs
Suspicious strings and export indicative of Industroyer wiper module.
Processes:
resource yara_rule sample win_industroyer_w1 sample win_industroyer_w7 sample win_industroyer_w8 -
Industroyer family
Files
-
ad23c7930dae02de1ea3c6836091b5fb3c62a89bf2bcfb83b4b39ede15904910.exe windows x86
36d59bffd5fdfe21575c7b0fbc2bf51d
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
FindClose
CreateFileW
ExitThread
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
TerminateProcess
CloseHandle
CreateThread
GetFileSize
GetCurrentProcessId
SetUnhandledExceptionFilter
DecodePointer
WriteFile
lstrlenW
FindNextFileW
Process32FirstW
FindFirstFileW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
UnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
RaiseException
user32
wsprintfW
advapi32
RegEnumKeyW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
shlwapi
PathCombineW
StrCmpW
psapi
EnumProcesses
Exports
Exports
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ