Behavioral task
behavioral1
Sample
c1f234ee29062e05c71fbb29d43b75e4a73aeccc95201dea7956fc6e6a5949cf.exe
Resource
win7-20230621-en
General
-
Target
1845537ec71c2e5b01523a9f80b4c87f.bin
-
Size
5.9MB
-
MD5
bca2797fc149d0aaf9daa8f495aacc73
-
SHA1
bdf8821dc7aa9f2c9a550944a31bdd78266cf3c1
-
SHA256
88c1040db49259b748641a273f47d5e914ad21e84dc036605b2018c83e2e4e35
-
SHA512
b533bcd13eb0706eab72f4b7e2320878a11a950be0d91b1730fc2058b1d37820f55b63bdfce44d80758fe4623c8a1c8adc149022ec83522aea90edc28d9be31b
-
SSDEEP
98304:ov2XrxKKyghCzIgfije9z5HVjWthtde6X8Pxy49lCdXa33MBOLX5Nauns49lrL2g:ovicKvPgKIz5HQhtdEPxy4gXaHLiS9lR
Malware Config
Signatures
-
resource yara_rule static1/unpack001/c1f234ee29062e05c71fbb29d43b75e4a73aeccc95201dea7956fc6e6a5949cf.exe vmprotect
Files
-
1845537ec71c2e5b01523a9f80b4c87f.bin.zip
Password: infected
-
c1f234ee29062e05c71fbb29d43b75e4a73aeccc95201dea7956fc6e6a5949cf.exe.exe windows x86
Password: infected
1d6c410ad90082df83010d78a0e3838a
Code Sign
19:c8:f4:eb:a2:94:21:a3:44:ee:51:01:4a:50:87:c2Certificate
IssuerCN=Philips BHD827 Series 9000 (white/gold)Not Before25/06/2023, 20:10Not After26/06/2033, 20:10SubjectCN=Philips BHD827 Series 9000 (white/gold)39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
87:1a:fa:bc:39:e5:84:98:ea:69:ed:17:d5:0d:ea:3e:51:85:b3:76:50:b4:d7:d1:17:26:91:ab:a2:9e:01:0eSigner
Actual PE Digest87:1a:fa:bc:39:e5:84:98:ea:69:ed:17:d5:0d:ea:3e:51:85:b3:76:50:b4:d7:d1:17:26:91:ab:a2:9e:01:0eDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ReleaseDC
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
GetDeviceCaps
ole32
CoCreateInstance
oleaut32
SysFreeString
crypt32
CryptStringToBinaryA
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ