Static task
static1
Behavioral task
behavioral1
Sample
bc3752db8a7c002ef669d320b4c615a7662fbb2ef3e974509a8e2f348d91ec66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bc3752db8a7c002ef669d320b4c615a7662fbb2ef3e974509a8e2f348d91ec66.exe
Resource
win10v2004-20231222-en
General
-
Target
bc3752db8a7c002ef669d320b4c615a7662fbb2ef3e974509a8e2f348d91ec66.exe
-
Size
707KB
-
MD5
44a9f9ae9b5aad3f54f158c9b000a3c4
-
SHA1
830b3bda180b0ae82c09b0e4b5d942f247cb245c
-
SHA256
bc3752db8a7c002ef669d320b4c615a7662fbb2ef3e974509a8e2f348d91ec66
-
SHA512
4734c37d4dfb3ce7e51363d0cac84b8d9b8af6a36f87cb868b97a6d74b5342b8f37a376ea80dcec374a79153785900cc90653d2c04c19d7570238663110429c1
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1O84vnh:6uaTmkZJ+naie5OTamgEoKxLW1Gh
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_USNDeleteJournal -
Detects executables containing commands for clearing Windows Event Logs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_ClearWinLogs -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc3752db8a7c002ef669d320b4c615a7662fbb2ef3e974509a8e2f348d91ec66.exe
Files
-
bc3752db8a7c002ef669d320b4c615a7662fbb2ef3e974509a8e2f348d91ec66.exe.exe windows:5 windows x86 arch:x86
2f7da257a3159bdb9faeb823ef872a56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetFileAttributesW
Sleep
GetLastError
LoadLibraryA
DeleteFileW
CloseHandle
RaiseException
GetSystemInfo
LoadLibraryW
CreateThread
SetVolumeMountPointW
GetProcAddress
ExitProcess
FindVolumeClose
CopyFileW
GetConsoleWindow
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
OpenMutexW
GetTickCount
lstrcmpW
GetDriveTypeW
IsDebuggerPresent
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
WaitForMultipleObjects
SetThreadPriority
ReleaseMutex
MoveFileW
GetFileSizeEx
SetFilePointerEx
LocalFree
GetCurrentProcessId
ReadConsoleW
SetEndOfFile
DecodePointer
WriteConsoleW
HeapReAlloc
HeapSize
GetFileAttributesW
WaitForSingleObject
CreateMutexA
SetProcessShutdownParameters
GetModuleFileNameW
GetSystemDefaultUILanguage
lstrlenW
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetPriorityClass
FindFirstVolumeW
FindFirstFileW
ReadFile
GetLocalTime
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetFileAttributesExW
CreateProcessW
CreateProcessA
GetExitCodeProcess
GetFileType
lstrcatW
GetCurrentThread
LCMapStringW
CompareStringW
GetACP
GetCommandLineA
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
ExitThread
MultiByteToWideChar
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
user32
wvsprintfW
ShowWindow
SystemParametersInfoW
wsprintfW
advapi32
OpenServiceA
CryptGenRandom
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
EnumDependentServicesA
CloseServiceHandle
OpenSCManagerA
ControlService
QueryServiceStatusEx
CryptGenKey
CryptDestroyKey
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextA
RegCloseKey
CryptEncrypt
RegCreateKeyExW
CryptExportKey
RegSetValueExW
OpenProcessToken
CryptImportKey
shell32
SHChangeNotify
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
rstrtmgr
RmEndSession
RmStartSession
RmRegisterResources
RmGetList
shlwapi
StrStrIW
PathRemoveExtensionW
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
userenv
RefreshPolicyEx
ws2_32
inet_ntoa
closesocket
getaddrinfo
WSAStartup
socket
connect
WSACleanup
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ