Behavioral task
behavioral1
Sample
1e90b6fc99a908420de123418deded8d8eadf2114ac43ee1ec366681b5358c17.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1e90b6fc99a908420de123418deded8d8eadf2114ac43ee1ec366681b5358c17.exe
Resource
win10v2004-20230220-en
General
-
Target
1e90b6fc99a908420de123418deded8d8eadf2114ac43ee1ec366681b5358c17.zip
-
Size
4.5MB
-
MD5
624e12c62c1872b99ffe16ff20e5dd3b
-
SHA1
3db859bd14eba971a3a66b166f0526731ab3e3a0
-
SHA256
f50d423389237b317931741f174e060e84008850dd3f7d8deecf96438a95e1e6
-
SHA512
eff065abd245717ba28829bb022a2cad46f8b89c0e2de44501c106dfa192f1e36b0672ecdb2c1106cd81a811cb6d7d7e8dec86e043cda8e4e82a1ea7da0ff6f4
-
SSDEEP
98304:TMz8NqWsAXBNvZ3apD+R2Xq8GogjpyQ5EQowOYxORmidSXsKlKLga5:7MWs8ZIFqdogjdOw1MhdIsKE
Malware Config
Signatures
-
resource yara_rule static1/unpack001/1e90b6fc99a908420de123418deded8d8eadf2114ac43ee1ec366681b5358c17.exe vmprotect
Files
-
1e90b6fc99a908420de123418deded8d8eadf2114ac43ee1ec366681b5358c17.zip.zip
Password: infected
-
1e90b6fc99a908420de123418deded8d8eadf2114ac43ee1ec366681b5358c17.exe.exe windows x86
Password: infected
f9644890a52aa13e3e994733d15fcb99
Code Sign
54:36:1f:0c:ed:37:d8:a2:4c:d1:1b:25:c2:e4:e8:9aCertificate
IssuerCN=Intel Celeron Skylake G3900 OEMNot Before13-11-2022 23:31Not After14-11-2032 23:31SubjectCN=Intel Celeron Skylake G3900 OEM90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11-05-2022 00:00Not After10-08-2033 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
1b:b8:16:f5:20:da:16:8f:d8:5e:b0:f0:19:16:7f:cd:ca:28:1d:0b:13:50:ed:f1:bb:74:de:64:02:0e:3c:8cSigner
Actual PE Digest1b:b8:16:f5:20:da:16:8f:d8:5e:b0:f0:19:16:7f:cd:ca:28:1d:0b:13:50:ed:f1:bb:74:de:64:02:0e:3c:8cDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Intel Celeron Skylake G3900 OEM27-02-2023 09:36 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionEx
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CharNextA
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CoCreateInstance
Sections
.text Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ