Static task
static1
Behavioral task
behavioral1
Sample
f0d0781bfccd20c1caa2dbaf03edc6262983a16f94239b079eb83fa22755bb6e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f0d0781bfccd20c1caa2dbaf03edc6262983a16f94239b079eb83fa22755bb6e.exe
Resource
win10v2004-20231215-en
General
-
Target
f0d0781bfccd20c1caa2dbaf03edc6262983a16f94239b079eb83fa22755bb6e.exe
-
Size
707KB
-
MD5
d5980d070ff74bb810fb95cd21332ae2
-
SHA1
73d0f26f3a2100605765d991456090392e157a63
-
SHA256
f0d0781bfccd20c1caa2dbaf03edc6262983a16f94239b079eb83fa22755bb6e
-
SHA512
56eddd4dc0b9a9bc5c8ca5178935a6ea4f6b487f28120c6956e5b1879cb4e91a4fea1db06e32afeadaaa62047f8e0938c99ac0a4ec3260f85c8c90fec67f1f88
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1V8nvnh:6uaTmkZJ+naie5OTamgEoKxLW4vh
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_USNDeleteJournal -
Detects executables containing commands for clearing Windows Event Logs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_ClearWinLogs -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0d0781bfccd20c1caa2dbaf03edc6262983a16f94239b079eb83fa22755bb6e.exe
Files
-
f0d0781bfccd20c1caa2dbaf03edc6262983a16f94239b079eb83fa22755bb6e.exe.exe windows:5 windows x86 arch:x86
2f7da257a3159bdb9faeb823ef872a56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetFileAttributesW
Sleep
GetLastError
LoadLibraryA
DeleteFileW
CloseHandle
RaiseException
GetSystemInfo
LoadLibraryW
CreateThread
SetVolumeMountPointW
GetProcAddress
ExitProcess
FindVolumeClose
CopyFileW
GetConsoleWindow
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
OpenMutexW
GetTickCount
lstrcmpW
GetDriveTypeW
IsDebuggerPresent
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
WaitForMultipleObjects
SetThreadPriority
ReleaseMutex
MoveFileW
GetFileSizeEx
SetFilePointerEx
LocalFree
GetCurrentProcessId
ReadConsoleW
SetEndOfFile
DecodePointer
WriteConsoleW
HeapReAlloc
HeapSize
GetFileAttributesW
WaitForSingleObject
CreateMutexA
SetProcessShutdownParameters
GetModuleFileNameW
GetSystemDefaultUILanguage
lstrlenW
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetPriorityClass
FindFirstVolumeW
FindFirstFileW
ReadFile
GetLocalTime
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetFileAttributesExW
CreateProcessW
CreateProcessA
GetExitCodeProcess
GetFileType
lstrcatW
GetCurrentThread
LCMapStringW
CompareStringW
GetACP
GetCommandLineA
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
ExitThread
MultiByteToWideChar
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
user32
wvsprintfW
ShowWindow
SystemParametersInfoW
wsprintfW
advapi32
OpenServiceA
CryptGenRandom
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
EnumDependentServicesA
CloseServiceHandle
OpenSCManagerA
ControlService
QueryServiceStatusEx
CryptGenKey
CryptDestroyKey
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextA
RegCloseKey
CryptEncrypt
RegCreateKeyExW
CryptExportKey
RegSetValueExW
OpenProcessToken
CryptImportKey
shell32
SHChangeNotify
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
rstrtmgr
RmEndSession
RmStartSession
RmRegisterResources
RmGetList
shlwapi
StrStrIW
PathRemoveExtensionW
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
userenv
RefreshPolicyEx
ws2_32
inet_ntoa
closesocket
getaddrinfo
WSAStartup
socket
connect
WSACleanup
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ