Static task
static1
Behavioral task
behavioral1
Sample
2023-05-20_e624f723f112a1cc33a95da3b76c8a5e_teslacrypt.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-05-20_e624f723f112a1cc33a95da3b76c8a5e_teslacrypt.exe
Resource
win10v2004-20230220-en
General
-
Target
2023-05-20_e624f723f112a1cc33a95da3b76c8a5e_teslacrypt
-
Size
262KB
-
MD5
e624f723f112a1cc33a95da3b76c8a5e
-
SHA1
40190a7201ce5af66de5d8359d96d76447a1f47b
-
SHA256
4bcb0aa3e5c4da18fec5b35616f318ddac5caa0faa497287e7b51ae92c2e64b5
-
SHA512
40c39bb48ab6b3bd7393fe2034447e818cc73ee75c8cb2f1232fd27a53f3310e0022f4b2df8f57e49e6a37ec3f9c6903802410d984c2fe4ff497f946c79aafd1
-
SSDEEP
3072:6JpYmsBADBDBPVLBT53WhR+GfEG4j6k5+5CiDrgh4fy5HAHIgHZBYgmK7JR4OJ1G:KWiG14j/MFghey5HQl7n4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-05-20_e624f723f112a1cc33a95da3b76c8a5e_teslacrypt
Files
-
2023-05-20_e624f723f112a1cc33a95da3b76c8a5e_teslacrypt.exe windows x86
61f6c0cac2c05c4ab2fe7187e15aa256
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdipDisposeImage
GdipFree
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipSaveImageToFile
shlwapi
PathFindExtensionW
PathFindFileNameW
psapi
GetProcessImageFileNameW
EnumProcesses
ntdll
isxdigit
wcsstr
wcsncmp
strstr
_vsnwprintf
_allshl
_alldiv
_aullshr
RtlUnwind
kernel32
GetLogicalDriveStringsW
HeapFree
GetProcessHeap
WriteFile
GlobalAlloc
Sleep
GetFileAttributesW
CreateFileW
ExitThread
FlushFileBuffers
GetLastError
GlobalFree
FindClose
FindNextFileW
CloseHandle
DeleteFileW
SetFileAttributesW
GetVolumeInformationW
GlobalMemoryStatus
FreeLibrary
QueryPerformanceCounter
GetTickCount
MoveFileExW
GetProcAddress
GetCurrentProcessId
GetEnvironmentVariableW
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GetModuleHandleW
CopyFileW
GetModuleFileNameW
SetThreadPriority
SetLastError
LocalAlloc
GetShortPathNameW
LocalFree
CreateThread
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetCurrentThreadId
TlsFree
HeapAlloc
GetDriveTypeW
SetFilePointer
FindFirstFileW
GetFileSize
ReadFile
SetHandleCount
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetConsoleCP
LoadLibraryW
GetConsoleMode
MultiByteToWideChar
GetStringTypeW
SetStdHandle
WriteConsoleW
IsProcessorFeaturePresent
HeapSize
SetEndOfFile
GetVersionExW
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
ExitProcess
HeapCreate
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
user32
LoadStringW
GetDC
ReleaseDC
DrawTextA
gdi32
SetBkMode
CreateFontW
GetStockObject
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
advapi32
RegCreateKeyExW
AdjustTokenPrivileges
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
LookupPrivilegeValueA
GetTokenInformation
GetSidSubAuthority
OpenProcessToken
RegSetValueExW
RegCloseKey
RegFlushKey
RegCreateKeyExA
RegQueryValueExW
RegQueryValueExA
shell32
ShellExecuteExW
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoInitializeEx
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
wininet
InternetOpenA
InternetCrackUrlA
HttpSendRequestA
InternetSetOptionA
InternetCloseHandle
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ