Behavioral task
behavioral1
Sample
02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e.exe
Resource
win7-20220414-en
General
-
Target
7648666163.zip
-
Size
4.2MB
-
MD5
35e60749380182dbaa31a0975d1dd2b6
-
SHA1
150f3be9efc84b473b6e5c056fa2b0fee80bc6d0
-
SHA256
ebd1d7a8456315b3d50a1e2f1e52b56bdeccdd061246a30684001530cda9709c
-
SHA512
d499a0f16fbc51fb9fadf1bb0b6a31d9ee4bf5d2afca2469856cc4e27d62ff47209a6ba027f2ec4996f06245e3e99868f5d865f2e91f421d5095815594520e6f
-
SSDEEP
98304:zHEmYPrNBQjsiNZ/jnwh97XCZUsnw4Bh0VAJL:zkme2HP/jwh97XCCsTBh0VwL
Malware Config
Signatures
-
resource yara_rule static1/unpack001/02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e vmprotect -
resource yara_rule static1/unpack001/02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e themida
Files
-
7648666163.zip.zip
Password: infected
-
02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e.exe windows x86
e40757489f9bf9a0a0c1e0329f45b1df
Code Sign
65:14:d9:2a:89:9c:32:8b:48:87:01:d2:de:32:85:f8Certificate
IssuerCN=JBL LIVE 7001 BiałyNot Before11-06-2022 10:15Not After12-06-2032 10:15SubjectCN=JBL LIVE 7001 Biały90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11-05-2022 00:00Not After10-08-2033 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
00:d7:9c:95:63:7f:cc:d0:16:be:f5:4e:8d:5e:1f:6e:df:07:f9:2d:f3:bd:40:6d:3a:d0:81:b0:bb:24:5b:79Signer
Actual PE Digest00:d7:9c:95:63:7f:cc:d0:16:be:f5:4e:8d:5e:1f:6e:df:07:f9:2d:f3:bd:40:6d:3a:d0:81:b0:bb:24:5b:79Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=JBL LIVE 7001 Biały23-06-2022 17:33 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
GetUserNameW
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
Size: - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: - Virtual size: 756KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ