Behavioral task
behavioral1
Sample
6e8b742abfee47d32d9f7287daa0143565ed6f48c4ff9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e8b742abfee47d32d9f7287daa0143565ed6f48c4ff9.exe
Resource
win10v2004-20221111-en
General
-
Target
6e8b742abfee47d32d9f7287daa0143565ed6f48c4ff9.exe
-
Size
4.0MB
-
MD5
2d244458e27de830d4dedd8d99cc98c9
-
SHA1
76fa961da3f87f1ca045bf37f71883fb4649a3e7
-
SHA256
6e8b742abfee47d32d9f7287daa0143565ed6f48c4ff9406ac1e8b2290f72c9b
-
SHA512
3e6ed3f757ee8c3251a0e02c3f0fa3e6faeba640d5a83cbd646511cba3de69b8e18aa379560ce0d8489f95b6d2b579dd3213b595ca85122caa9e382ea76e3fab
-
SSDEEP
98304:X9VjGmi6Y+tlo4mL+C7epxzHuKbFmjBlIu2/OZFuHxMMMo:N0mi6v/OqxzOKbkv+/i0
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
6e8b742abfee47d32d9f7287daa0143565ed6f48c4ff9.exe.exe windows x86
f540b6d6dcfc33b21d0deb0ccba24751
Code Sign
55:3d:3c:af:fd:ce:00:a4:44:b8:ad:a1:2d:77:91:2cCertificate
IssuerCN=Verbatim Digital EVO-II 5Tb HDWG460EZSTA N300 (4096rpm) 4036Mb 0.5 RtlNot Before23-01-2023 16:25Not After24-01-2033 16:25SubjectCN=Verbatim Digital EVO-II 5Tb HDWG460EZSTA N300 (4096rpm) 4036Mb 0.5 Rtl90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11-05-2022 00:00Not After10-08-2033 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
f4:11:8e:e9:a6:94:5a:58:cf:5e:a7:38:72:80:40:30:62:7e:d3:7e:d9:26:38:a3:6a:df:5d:79:36:e0:a0:d2Signer
Actual PE Digestf4:11:8e:e9:a6:94:5a:58:cf:5e:a7:38:72:80:40:30:62:7e:d3:7e:d9:26:38:a3:6a:df:5d:79:36:e0:a0:d2Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Verbatim Digital EVO-II 5Tb HDWG460EZSTA N300 (4096rpm) 4036Mb 0.5 Rtl20-01-2023 16:00 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionEx
lstrlenA
lstrcatA
GetModuleHandleA
SetCurrentDirectoryA
Sleep
GetModuleHandleExA
GetFileAttributesA
GetBinaryTypeA
QueryFullProcessImageNameA
GetSystemDirectoryA
GlobalAlloc
lstrcpyA
SetFileAttributesA
VerSetConditionMask
WideCharToMultiByte
VerifyVersionInfoW
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetProcAddress
lstrcpynA
GetProcessHeap
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
EnterCriticalSection
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
FindClose
GetTempPathW
CreateMutexW
WaitForSingleObject
GetFileAttributesW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
MultiByteToWideChar
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
LoadLibraryA
WaitForSingleObjectEx
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
LoadLibraryW
HeapCompact
HeapDestroy
UnlockFile
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
SystemTimeToFileTime
FreeLibrary
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
WriteConsoleW
CloseHandle
CreateFileA
GetLastError
CreateFileW
SetFilePointer
WriteFile
UnlockFileEx
ReadFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
CreateDirectoryW
FindFirstFileExW
FindNextFileW
SetFilePointerEx
GetFileInformationByHandleEx
QueryPerformanceFrequency
LCMapStringEx
EncodePointer
DecodePointer
GetCPInfo
GetStringTypeW
SetLastError
GetThreadTimes
GetCurrentThread
InterlockedPushEntrySList
RaiseException
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameW
GetStdHandle
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
SetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileSizeEx
GetTimeZoneInformation
IsValidCodePage
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CharNextA
GetProcessWindowStation
GetUserObjectInformationW
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
GetTokenInformation
CryptReleaseContext
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
Sections
.text Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ