Static task
static1
Behavioral task
behavioral1
Sample
7d4f29346ec00b14101a0de3f0c22b88fe05a124e54b2f678ceff3d8897a69c0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d4f29346ec00b14101a0de3f0c22b88fe05a124e54b2f678ceff3d8897a69c0.exe
Resource
win10v2004-20231215-en
General
-
Target
7d4f29346ec00b14101a0de3f0c22b88fe05a124e54b2f678ceff3d8897a69c0.exe
-
Size
707KB
-
MD5
d11ddde4617c0cc05ce8a950ec9560be
-
SHA1
b0480f6b08c1d821d8c589ca41345a12b0b4db0d
-
SHA256
7d4f29346ec00b14101a0de3f0c22b88fe05a124e54b2f678ceff3d8897a69c0
-
SHA512
da5610b43d210ee5c108a13b8d60d6b95ff339888f03a1aeaad93eb60f513e68d6303b5654e18acecd6d6c3a9acca307bf3a8df40059cad7772e5aaf939369d2
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1V88vnh:6uaTmkZJ+naie5OTamgEoKxLWYih
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_USNDeleteJournal -
Detects executables containing commands for clearing Windows Event Logs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_ClearWinLogs -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d4f29346ec00b14101a0de3f0c22b88fe05a124e54b2f678ceff3d8897a69c0.exe
Files
-
7d4f29346ec00b14101a0de3f0c22b88fe05a124e54b2f678ceff3d8897a69c0.exe.exe windows:5 windows x86 arch:x86
2f7da257a3159bdb9faeb823ef872a56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetFileAttributesW
Sleep
GetLastError
LoadLibraryA
DeleteFileW
CloseHandle
RaiseException
GetSystemInfo
LoadLibraryW
CreateThread
SetVolumeMountPointW
GetProcAddress
ExitProcess
FindVolumeClose
CopyFileW
GetConsoleWindow
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
OpenMutexW
GetTickCount
lstrcmpW
GetDriveTypeW
IsDebuggerPresent
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
WaitForMultipleObjects
SetThreadPriority
ReleaseMutex
MoveFileW
GetFileSizeEx
SetFilePointerEx
LocalFree
GetCurrentProcessId
ReadConsoleW
SetEndOfFile
DecodePointer
WriteConsoleW
HeapReAlloc
HeapSize
GetFileAttributesW
WaitForSingleObject
CreateMutexA
SetProcessShutdownParameters
GetModuleFileNameW
GetSystemDefaultUILanguage
lstrlenW
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetPriorityClass
FindFirstVolumeW
FindFirstFileW
ReadFile
GetLocalTime
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetFileAttributesExW
CreateProcessW
CreateProcessA
GetExitCodeProcess
GetFileType
lstrcatW
GetCurrentThread
LCMapStringW
CompareStringW
GetACP
GetCommandLineA
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
ExitThread
MultiByteToWideChar
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
user32
wvsprintfW
ShowWindow
SystemParametersInfoW
wsprintfW
advapi32
OpenServiceA
CryptGenRandom
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
EnumDependentServicesA
CloseServiceHandle
OpenSCManagerA
ControlService
QueryServiceStatusEx
CryptGenKey
CryptDestroyKey
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextA
RegCloseKey
CryptEncrypt
RegCreateKeyExW
CryptExportKey
RegSetValueExW
OpenProcessToken
CryptImportKey
shell32
SHChangeNotify
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
rstrtmgr
RmEndSession
RmStartSession
RmRegisterResources
RmGetList
shlwapi
StrStrIW
PathRemoveExtensionW
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
userenv
RefreshPolicyEx
ws2_32
inet_ntoa
closesocket
getaddrinfo
WSAStartup
socket
connect
WSACleanup
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ