Behavioral task
behavioral1
Sample
196ecaabd29b61e93823bf31e5e69c9c1159c413f1e0325babba4473d95c2a8b.exe
Resource
win7-20220414-en
General
-
Target
7633406149.zip
-
Size
4.3MB
-
MD5
30695c368881324046a6c034b8734d15
-
SHA1
37eb9f6638efaae27b7a29e5c0ed9f2d4b86d8af
-
SHA256
8a08c5722a8b2e6a6c42ceb80a68a0552cfa8f65088a5c0fc8da95f8a2616ded
-
SHA512
88e7f60e7e804d62fc48a535ebaa13df37611d8bb959f3c7e22e59d744eb11fcb0f60f5d133781ff9d98ab596c403ed7ccb43578d5b0c3eb87e40f798a04cf25
-
SSDEEP
98304:KebpJydFnlQA08q9xusDitfHA1ZNgx14hSg4ZVo3pw1v06:Ke7OlQ9husDimc14wV+pwV06
Malware Config
Signatures
-
resource yara_rule static1/unpack001/196ecaabd29b61e93823bf31e5e69c9c1159c413f1e0325babba4473d95c2a8b vmprotect -
resource yara_rule static1/unpack001/196ecaabd29b61e93823bf31e5e69c9c1159c413f1e0325babba4473d95c2a8b themida
Files
-
7633406149.zip.zip
Password: infected
-
196ecaabd29b61e93823bf31e5e69c9c1159c413f1e0325babba4473d95c2a8b.exe windows x86
e40757489f9bf9a0a0c1e0329f45b1df
Code Sign
65:14:d9:2a:89:9c:32:8b:48:87:01:d2:de:32:85:f8Certificate
IssuerCN=JBL LIVE 7001 BiałyNot Before11/06/2022, 10:15Not After12/06/2032, 10:15SubjectCN=JBL LIVE 7001 Biały90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
a4:cf:7c:3e:0e:3c:29:7b:c7:78:f3:54:76:30:01:12:a5:cf:24:a7:98:a2:51:3b:cd:9d:96:b1:f8:ed:cc:65Signer
Actual PE Digesta4:cf:7c:3e:0e:3c:29:7b:c7:78:f3:54:76:30:01:12:a5:cf:24:a7:98:a2:51:3b:cd:9d:96:b1:f8:ed:cc:65Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=JBL LIVE 7001 Biały24/06/2022, 16:55 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
GetUserNameW
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
Size: - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: - Virtual size: 905KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ