Behavioral task
behavioral1
Sample
beef7e428f26c583dd92962cbe886f2e4286825a1637b7a427ce84139ab6307a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
beef7e428f26c583dd92962cbe886f2e4286825a1637b7a427ce84139ab6307a.exe
Resource
win10v2004-20221111-en
General
-
Target
beef7e428f26c583dd92962cbe886f2e4286825a1637b7a427ce84139ab6307a.zip
-
Size
1.1MB
-
MD5
e29a4153e08b5b85b4a51f8a2cd2714e
-
SHA1
1a2056b4d141fcfc44f7132f31cba62d6f31d86d
-
SHA256
c7ddb2dcb2f69e58707dc2126231038b9bdd2cef07e527b86da183033da2ab7d
-
SHA512
09ba693f0b79166b8bcb080611a1938d2776a962c1d44079522bb1c280c211c0e69f6249e08ba0d7e8902f1a2e3e6789be0b430438bbb9d1a595626c96b767fc
-
SSDEEP
24576:DFkiYGwOJ9NOhLaPrfx+edE7bcVSse6ZHApG1bK1ZJzfWgl:DW3OJahLaPrp944Vle6BCXZJCgl
Malware Config
Signatures
-
Royal Ransomware 1 IoCs
Processes:
resource yara_rule static1/unpack001/beef7e428f26c583dd92962cbe886f2e4286825a1637b7a427ce84139ab6307a.exe family_royal -
Royal family
Files
-
beef7e428f26c583dd92962cbe886f2e4286825a1637b7a427ce84139ab6307a.zip.zip
Password: infected
-
beef7e428f26c583dd92962cbe886f2e4286825a1637b7a427ce84139ab6307a.exe.exe windows x86
b6698f73aa8eb2b95b67acb6e8329fa7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrIW
ws2_32
WSAStartup
shutdown
setsockopt
connect
send
recv
WSASetLastError
getservbyname
getservbyport
gethostbyaddr
inet_ntoa
inet_addr
WSAGetLastError
WSACleanup
gethostbyname
select
ntohs
getsockopt
ioctlsocket
bind
WSAIoctl
closesocket
ntohl
WSASocketW
socket
WSAAddressToStringW
htonl
htons
crypt32
CertOpenStore
CertCloseStore
CertGetCertificateContextProperty
CertFreeCertificateContext
CertDuplicateCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
advapi32
CryptGetProvParam
CryptReleaseContext
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptDestroyKey
CryptSetHashParam
CryptAcquireContextW
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
shell32
CommandLineToArgvW
iphlpapi
GetIpAddrTable
netapi32
NetApiBufferFree
NetShareEnum
rstrtmgr
RmShutdown
RmEndSession
RmStartSession
RmGetList
RmRegisterResources
bcrypt
BCryptGenRandom
kernel32
CompareStringW
HeapAlloc
HeapFree
GetModuleFileNameW
LCMapStringW
HeapReAlloc
GetConsoleOutputCP
SetStdHandle
GetCurrentDirectoryW
GetFullPathNameW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
GetProcessHeap
GetTimeZoneInformation
HeapSize
WriteConsoleW
GetModuleHandleExW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
SetConsoleCtrlHandler
ReadFile
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlUnwind
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
GetLogicalDrives
FindFirstFileW
EnterCriticalSection
FindNextFileW
WriteFile
LeaveCriticalSection
FindClose
CreateFileW
ExitThread
Sleep
CloseHandle
CreateThread
lstrcmpiW
GetCommandLineW
lstrlenW
WaitForMultipleObjects
InitializeCriticalSection
InitializeConditionVariable
lstrlenA
WaitForSingleObject
DeleteCriticalSection
ExitProcess
CreateProcessW
WideCharToMultiByte
lstrcmpW
CancelIo
GetQueuedCompletionStatus
CreateIoCompletionPort
SleepConditionVariableCS
DecodePointer
GetFileSizeEx
GetCurrentProcess
WakeAllConditionVariable
GetProcessId
SetEndOfFile
CreateToolhelp32Snapshot
GetLastError
Process32NextW
Process32FirstW
GetNativeSystemInfo
SetFilePointerEx
MoveFileExW
FlushFileBuffers
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
FormatMessageA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualFree
GetEnvironmentVariableW
MultiByteToWideChar
GetACP
GetStdHandle
GetFileType
GetModuleHandleW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 499KB - Virtual size: 498KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ