Behavioral task
behavioral1
Sample
588dfcd0e8ebc570eaba342d6d220528a722be93a46c2dfa2306a7b662b25845.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
588dfcd0e8ebc570eaba342d6d220528a722be93a46c2dfa2306a7b662b25845.exe
Resource
win10v2004-20230220-en
General
-
Target
10468229090.zip
-
Size
93KB
-
MD5
8644dd58b7e0e0a46489410a3e22d4d7
-
SHA1
a9dcc31aac4cc223fe14898b11a978743c3628ca
-
SHA256
ad4fd995f3cb69238f4a07c30a155c2674ab1f67f91160a2b2d030ca7485ae47
-
SHA512
7c568852e23fa6e62dde8d1bce968d961c0e6982c18f6ed2c76f485949d55e72ae4ed2695d83a0620ca4ccab107db3bce7f674eab54e72cb612148fc2eac6aef
-
SSDEEP
1536:sU4eoiYQOu9tHVCIurgbIyuh0shvVHz8yFLbtuTI1Ii9ckCPlRG2f5ddQfiWuYP2:siWQOeMTrOIRRhpFVuhdkklRG2RHCHS1
Malware Config
Signatures
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule static1/unpack002/588dfcd0e8ebc570eaba342d6d220528a722be93a46c2dfa2306a7b662b25845.exe family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/588dfcd0e8ebc570eaba342d6d220528a722be93a46c2dfa2306a7b662b25845.exe
Files
-
10468229090.zip.zip
Password: infected
-
2daa5fa152b627f5ae23d2e8fa4e3e399d4899729ad32f184e32d59fd4dd20ef.zip
Password: infected
-
588dfcd0e8ebc570eaba342d6d220528a722be93a46c2dfa2306a7b662b25845.exe.exe windows x86
17a3893d66d35318253b647340956b4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectObject
SetPixel
SelectPalette
BitBlt
GetTextColor
CreateSolidBrush
CreateFontW
user32
LoadMenuW
CreateMenu
CreateWindowExW
DefWindowProcW
EndDialog
GetDlgItem
GetKeyNameTextW
IsDlgButtonChecked
kernel32
SetLastError
LoadLibraryW
LoadLibraryExA
GetLastError
FreeLibrary
FormatMessageW
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ