Static task
static1
Behavioral task
behavioral1
Sample
419962c96470625b3c7f97a107839ffd87fda7f0c9ddc1ec41340744aad33b9b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
419962c96470625b3c7f97a107839ffd87fda7f0c9ddc1ec41340744aad33b9b.exe
Resource
win10v2004-en-20220112
General
-
Target
419962c96470625b3c7f97a107839ffd87fda7f0c9ddc1ec41340744aad33b9b
-
Size
2.9MB
-
MD5
cff8d203c8ef346d726bce212600056a
-
SHA1
b242d9da357d4224a0ca5f2c708a0f139b035fcc
-
SHA256
419962c96470625b3c7f97a107839ffd87fda7f0c9ddc1ec41340744aad33b9b
-
SHA512
457e0ff3c53bd89a798cbd1480ac27a449b307e67facafa4fbc9ded980f8b7e47dda798f9a02270469f25053da09c4dd310a0700cfe0d0b68378cf93c367013d
-
SSDEEP
49152:yceMfiGspbkskTDmdsEGS5GFclHdFWdmZMciiZHlF1hyWcGHzVM0+QDWYYOu4X:zeOi3pbFkTHEG/FPe1F1hVzVM0t
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida
Files
-
419962c96470625b3c7f97a107839ffd87fda7f0c9ddc1ec41340744aad33b9b.exe windows x86
Code Sign
15:77:4d:13:56:68:a4:ac:42:29:b6:32:8d:d2:a4:b3Certificate
IssuerCN=Kingston Fury Beast DDR4 2x8Gb KF432C16BBK2/16Not Before10-11-2021 21:47Not After11-11-2031 21:47SubjectCN=Kingston Fury Beast DDR4 2x8Gb KF432C16BBK2/168c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23-10-2020 00:00Not After22-01-2032 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
71:52:3b:99:58:c7:24:0a:4d:0e:6f:e7:3b:a3:8e:0b:2e:bf:1e:f6:4e:c0:f2:35:65:1b:51:a6:1a:ec:ae:c0Signer
Actual PE Digest71:52:3b:99:58:c7:24:0a:4d:0e:6f:e7:3b:a3:8e:0b:2e:bf:1e:f6:4e:c0:f2:35:65:1b:51:a6:1a:ec:ae:c0Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Kingston Fury Beast DDR4 2x8Gb KF432C16BBK2/1614-02-2022 17:36 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 65KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
®°`~© Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
®°`~© Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
®°`~© Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ