Behavioral task
behavioral1
Sample
9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926.exe
Resource
win10v2004-20230220-en
General
-
Target
9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926.zip
-
Size
1.4MB
-
MD5
3b12b99f1c3067c1aa46491a758ba450
-
SHA1
dbb4ce6980a05d5e66914f36454b1f0940d6ef60
-
SHA256
52f03ab2a7ea80be35cb6cd4a41a450a154e4b6dca6f5244fb3b0ad157a01e1d
-
SHA512
a73b01a66f9f42653f1552e5ab78f790536389f016a50acf9596b56d3d5c0c31ba2b35624bc5c0c8b7b4004cba5502664bf327aa457c7e41f4793046ad955387
-
SSDEEP
24576:mct6C5XzfV0PLUbF0VhayfY5K3aaOW9CTi82mnX2KQcxpp0Yaxrq:3cCBzujUhGQYExM9NmnXlQcxtaxW
Malware Config
Signatures
-
Royal Ransomware 1 IoCs
resource yara_rule static1/unpack001/9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926 family_royal -
Royal family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926
Files
-
9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926.zip.zip
Password: infected
-
9db958bc5b4a21340ceeeb8c36873aa6bd02a460e688de56ccbba945384b1926.exe windows x64
150bdf1f53f6260c91ec3fcff5867019
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetQueuedCompletionStatus
CreateIoCompletionPort
SleepConditionVariableCS
ReadFile
GetFileSizeEx
GetCurrentProcess
WakeAllConditionVariable
GetProcessId
SetEndOfFile
CreateToolhelp32Snapshot
GetLastError
Process32NextW
Process32FirstW
GetNativeSystemInfo
SetFilePointerEx
MoveFileExW
FlushFileBuffers
RtlVirtualUnwind
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
FormatMessageA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualFree
GetEnvironmentVariableW
MultiByteToWideChar
GetACP
GetStdHandle
CancelIo
GetModuleHandleW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
WriteConsoleW
HeapSize
GetTimeZoneInformation
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
lstrcmpW
WideCharToMultiByte
CreateProcessW
ExitProcess
DeleteCriticalSection
WaitForSingleObject
lstrlenA
InitializeConditionVariable
InitializeCriticalSection
WaitForMultipleObjects
lstrlenW
GetCommandLineW
lstrcmpiW
CreateThread
CloseHandle
Sleep
GetEnvironmentStringsW
GetCommandLineA
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
SetStdHandle
GetConsoleOutputCP
GetOEMCP
IsValidCodePage
GetStringTypeW
GetCPInfo
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapAlloc
HeapFree
GetModuleFileNameW
SetConsoleCtrlHandler
GetModuleHandleExW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
ExitThread
CreateFileW
FindClose
LeaveCriticalSection
WriteFile
FindNextFileW
EnterCriticalSection
FindFirstFileW
GetFileType
GetLogicalDrives
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
wsprintfW
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
advapi32
DeregisterEventSource
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
ReportEventW
RegisterEventSourceW
CryptAcquireContextW
CryptEnumProvidersW
CryptSignHashW
shell32
CommandLineToArgvW
shlwapi
StrStrIW
ws2_32
WSASetLastError
getservbyname
getservbyport
gethostbyaddr
inet_ntoa
send
WSAGetLastError
WSAStartup
gethostbyname
ntohs
getsockopt
ioctlsocket
bind
WSAIoctl
closesocket
ntohl
WSASocketW
socket
WSAAddressToStringW
htonl
htons
connect
setsockopt
recv
shutdown
inet_addr
WSACleanup
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
iphlpapi
GetIpAddrTable
netapi32
NetShareEnum
NetApiBufferFree
rstrtmgr
RmStartSession
RmGetList
RmRegisterResources
RmShutdown
RmEndSession
bcrypt
BCryptGenRandom
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 770KB - Virtual size: 770KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ