Static task
static1
Behavioral task
behavioral1
Sample
a08b73c159c3924f60a78fe21029cae84ee88e289a7ff6bdf27869399cc88382.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a08b73c159c3924f60a78fe21029cae84ee88e289a7ff6bdf27869399cc88382.exe
Resource
win10v2004-en-20220113
General
-
Target
a08b73c159c3924f60a78fe21029cae84ee88e289a7ff6bdf27869399cc88382
-
Size
2.9MB
-
MD5
c561708b03a328fa892fe6151f81c2dd
-
SHA1
02f445cab7c389c324d31b621ff7f56772317cd6
-
SHA256
a08b73c159c3924f60a78fe21029cae84ee88e289a7ff6bdf27869399cc88382
-
SHA512
2e7143f8aab899a8267f910345feed02d0604fd3d0b56d42b797eb5ac3f67bf23856efe43167fd0b33ea3d5c9a4d1b646e9ffa3dc3c6695ae7e2d1f2b7196a54
-
SSDEEP
49152:drKwmrgLqYwc6XtG3FAHlE/z4IWxBYVxrh2Hr9Kj0+QDWYYOu4r:Aw+gL8j+iHmzHVxrYHr9dd
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida
Files
-
a08b73c159c3924f60a78fe21029cae84ee88e289a7ff6bdf27869399cc88382.exe windows x86
Code Sign
4d:43:e6:87:99:03:03:87:41:57:fb:71:67:b7:e1:06Certificate
IssuerCN=Kingston Fury Beast DDR4 4x8Gb KF432C16BBK2/32Not Before10-11-2021 22:22Not After11-11-2031 22:22SubjectCN=Kingston Fury Beast DDR4 4x8Gb KF432C16BBK2/328c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23-10-2020 00:00Not After22-01-2032 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
2f:d9:89:41:05:1c:6b:ad:3f:f5:db:75:b8:c8:83:48:7e:09:bf:e9:50:cf:d5:cd:10:0c:a8:f7:11:02:5f:adSigner
Actual PE Digest2f:d9:89:41:05:1c:6b:ad:3f:f5:db:75:b8:c8:83:48:7e:09:bf:e9:50:cf:d5:cd:10:0c:a8:f7:11:02:5f:adDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Kingston Fury Beast DDR4 4x8Gb KF432C16BBK2/3214-02-2022 17:39 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 65KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
£€^�� Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
£€^�� Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
£€^�� Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ