Static task
static1
Behavioral task
behavioral1
Sample
d42ead08be644593e4095b85dfb96eace4f7ad82640d0e533b332e685f9d4eeb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d42ead08be644593e4095b85dfb96eace4f7ad82640d0e533b332e685f9d4eeb.exe
Resource
win10v2004-en-20220113
General
-
Target
d42ead08be644593e4095b85dfb96eace4f7ad82640d0e533b332e685f9d4eeb
-
Size
2.6MB
-
MD5
ddd74b65f9f964f35b3fac95f4d84cfb
-
SHA1
f28e66c8c8e6e1808ec58a0fd8cc3371f89e8bed
-
SHA256
d42ead08be644593e4095b85dfb96eace4f7ad82640d0e533b332e685f9d4eeb
-
SHA512
0d01a7aab1714414013357266cf81348f45f24ca4e27c827ee5bb430d4e3ccf16b6855cff8376f374e1803eebada933901c479996103fa71dd0c1ba6424d7cad
-
SSDEEP
49152:1xyE/Re9K9mIvaoZyryXe4p4Cv4fw+wfxNfYkGk/pWteBLg6QaBl0g+QDWYYOu4E:Dx/Re9Klvaww5gv4PecfCBqA1W
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida
Files
-
d42ead08be644593e4095b85dfb96eace4f7ad82640d0e533b332e685f9d4eeb.exe windows x86
Code Sign
52:37:68:5f:81:27:74:8b:4b:2e:2e:ff:78:e9:84:32Certificate
IssuerCN=Kingston Fury Beast DDR4 2x16Gb KF432C16BK2/32Not Before10-11-2021 23:43Not After11-11-2031 23:43SubjectCN=Kingston Fury Beast DDR4 2x16Gb KF432C16BK2/328c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23-10-2020 00:00Not After22-01-2032 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
d1:89:28:c5:12:6d:fb:25:c8:0b:e6:ed:08:a2:95:18:6c:9d:93:6f:57:01:81:5a:71:f7:a4:53:b8:4b:3b:20Signer
Actual PE Digestd1:89:28:c5:12:6d:fb:25:c8:0b:e6:ed:08:a2:95:18:6c:9d:93:6f:57:01:81:5a:71:f7:a4:53:b8:4b:3b:20Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Kingston Fury Beast DDR4 2x16Gb KF432C16BK2/3214-02-2022 17:36 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 65KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
£€^�� Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
£€^�� Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
£€^�� Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ