Static task
static1
Behavioral task
behavioral1
Sample
protected.exe
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
protected.exe
Resource
win10v2004-20230703-en
General
-
Target
protected.exe
-
Size
2.2MB
-
MD5
3a4aa9e265eaaca0735e081cc33bb83a
-
SHA1
14c9765da189dcfd42da2439da26b0a86b0f7e57
-
SHA256
7ba3ed9e9d8e035b3f2e2a57bb04ffd3ef7bdd30609e3d4bf2fa55fd9afb3089
-
SHA512
570147e9dd6c39fb83bb9de569c78897c52a8e743f29f684cc39581054059db54c308452d3e26f8465a514a269b1380a28983db16f7a2a049160c53f1e018fbc
-
SSDEEP
49152:F9cpfkxW2uTJLirHHBZAkN26gIlC20TuiYcrop:skM28aGkN26gQt0Turcr+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource protected.exe
Files
-
protected.exe.exe windows x64
0c930ed4c2c9bf1692e12cc63fcef607
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
CloseHandle
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
CreateFileA
HeapFree
VirtualAlloc
VirtualFree
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
DeviceIoControl
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
HeapReAlloc
HeapAlloc
GetLastError
DecodePointer
LoadLibraryA
RemoveVectoredExceptionHandler
ReadFile
AddVectoredExceptionHandler
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
DeleteFileW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
LocalFree
FormatMessageA
GetLocaleInfoEx
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFullPathNameW
SetFileInformationByHandle
GetTempPathW
AreFileApisANSI
GetModuleHandleW
GetFileInformationByHandleEx
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RaiseException
RtlPcToFileHeader
RtlUnwindEx
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
SetEndOfFile
advapi32
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
ntdll
NtQuerySystemInformation
RtlCaptureContext
NtLoadDriver
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlLookupFunctionEntry
RtlVirtualUnwind
NtUnloadDriver
Sections
.text Size: 234KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 597KB - Virtual size: 603KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vlizer Size: 1.3MB - Virtual size: 5.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE