Static task
static1
Behavioral task
behavioral1
Sample
4e6d43249aaabd1aaefc63d095a47762557559a55ff5bdaa1e802e7084950e91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e6d43249aaabd1aaefc63d095a47762557559a55ff5bdaa1e802e7084950e91.exe
Resource
win10v2004-20231215-en
General
-
Target
4e6d43249aaabd1aaefc63d095a47762557559a55ff5bdaa1e802e7084950e91.exe
-
Size
707KB
-
MD5
53fb455c5f5d0ac6b96b479b39a64db6
-
SHA1
17f857e256a9f998141c5e1bb8bd95623ee7c62c
-
SHA256
4e6d43249aaabd1aaefc63d095a47762557559a55ff5bdaa1e802e7084950e91
-
SHA512
91cc8116bb358c2177f66b3f21704e541152c4389c27c90d20ef89f7afc33f19536ffcfe7b857bc5272c456f05d28680514a1c8a330b30d3f89b3c8f23681513
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1N87vnh:6uaTmkZJ+naie5OTamgEoKxLWIrh
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_USNDeleteJournal -
Detects executables containing commands for clearing Windows Event Logs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_ClearWinLogs -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e6d43249aaabd1aaefc63d095a47762557559a55ff5bdaa1e802e7084950e91.exe
Files
-
4e6d43249aaabd1aaefc63d095a47762557559a55ff5bdaa1e802e7084950e91.exe.exe windows:5 windows x86 arch:x86
2f7da257a3159bdb9faeb823ef872a56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetFileAttributesW
Sleep
GetLastError
LoadLibraryA
DeleteFileW
CloseHandle
RaiseException
GetSystemInfo
LoadLibraryW
CreateThread
SetVolumeMountPointW
GetProcAddress
ExitProcess
FindVolumeClose
CopyFileW
GetConsoleWindow
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
OpenMutexW
GetTickCount
lstrcmpW
GetDriveTypeW
IsDebuggerPresent
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
WaitForMultipleObjects
SetThreadPriority
ReleaseMutex
MoveFileW
GetFileSizeEx
SetFilePointerEx
LocalFree
GetCurrentProcessId
ReadConsoleW
SetEndOfFile
DecodePointer
WriteConsoleW
HeapReAlloc
HeapSize
GetFileAttributesW
WaitForSingleObject
CreateMutexA
SetProcessShutdownParameters
GetModuleFileNameW
GetSystemDefaultUILanguage
lstrlenW
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetPriorityClass
FindFirstVolumeW
FindFirstFileW
ReadFile
GetLocalTime
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetFileAttributesExW
CreateProcessW
CreateProcessA
GetExitCodeProcess
GetFileType
lstrcatW
GetCurrentThread
LCMapStringW
CompareStringW
GetACP
GetCommandLineA
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
ExitThread
MultiByteToWideChar
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
user32
wvsprintfW
ShowWindow
SystemParametersInfoW
wsprintfW
advapi32
OpenServiceA
CryptGenRandom
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
EnumDependentServicesA
CloseServiceHandle
OpenSCManagerA
ControlService
QueryServiceStatusEx
CryptGenKey
CryptDestroyKey
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextA
RegCloseKey
CryptEncrypt
RegCreateKeyExW
CryptExportKey
RegSetValueExW
OpenProcessToken
CryptImportKey
shell32
SHChangeNotify
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
rstrtmgr
RmEndSession
RmStartSession
RmRegisterResources
RmGetList
shlwapi
StrStrIW
PathRemoveExtensionW
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
userenv
RefreshPolicyEx
ws2_32
inet_ntoa
closesocket
getaddrinfo
WSAStartup
socket
connect
WSACleanup
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ