Behavioral task
behavioral1
Sample
bb2f8c51f4e5b64b272d446c34c24e5c99d379ca8adb1d7421cfa81394875b52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb2f8c51f4e5b64b272d446c34c24e5c99d379ca8adb1d7421cfa81394875b52.exe
Resource
win10-20231215-en
General
-
Target
bb2f8c51f4e5b64b272d446c34c24e5c99d379ca8adb1d7421cfa81394875b52
-
Size
5.2MB
-
MD5
94f57ae65d2d1c2329291cedc8e98a78
-
SHA1
9258e4b4dcc18dc2f0e0288bf5a0bede30064a13
-
SHA256
bb2f8c51f4e5b64b272d446c34c24e5c99d379ca8adb1d7421cfa81394875b52
-
SHA512
fa8c5c60f617afff60504e98ae7b43c4a3a9a845560087643e7df94d7c41102fa90b6e987ddf7f5edf98e699e12e276a7b2be77850c9b419e85373e33fe9de72
-
SSDEEP
98304:Xx1DTPF+57EeWYBNV6B09rQa30fIDYLlFOvg17rtbiScWR9Z8dPZIFvZd:hX+SYvV6B09sbfIEe2xg8b4a3
Malware Config
Signatures
-
resource yara_rule sample themida
Files
-
bb2f8c51f4e5b64b272d446c34c24e5c99d379ca8adb1d7421cfa81394875b52.exe windows:6 windows x86 arch:x86
0c206d7178a19f77d27f1f2a3373c97b
Code Sign
59:ae:12:33:e1:80:68:97:43:8d:f0:ee:c7:05:1e:17Certificate
IssuerCN=AVG Technologies USA LLC ™‰™‰™‰Not Before06/01/2024, 10:14Not After07/01/2034, 10:14SubjectCN=AVG Technologies USA LLC ™‰™‰™‰39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
b4:0f:32:f9:b9:4c:b0:72:7c:05:7b:fe:a4:fe:42:6f:9b:0f:19:ed:23:85:dc:5b:c1:13:a9:48:ae:7c:1d:a6Signer
Actual PE Digestb4:0f:32:f9:b9:4c:b0:72:7c:05:7b:fe:a4:fe:42:6f:9b:0f:19:ed:23:85:dc:5b:c1:13:a9:48:ae:7c:1d:a6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetClipboardData
advapi32
RegSetValueExA
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
wininet
InternetReadFile
Sections
Size: - Virtual size: 414KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.LABS+[^ Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.LABS+[^ Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp° Size: - Virtual size: 984KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp° Size: 512B - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp° Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ