Static task
static1
Behavioral task
behavioral1
Sample
f853bc36a85913401ba291b3540c4f661e375db3d35f9d8ff390d18fbe99ccaa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f853bc36a85913401ba291b3540c4f661e375db3d35f9d8ff390d18fbe99ccaa.exe
Resource
win10v2004-20231215-en
General
-
Target
f853bc36a85913401ba291b3540c4f661e375db3d35f9d8ff390d18fbe99ccaa.exe
-
Size
707KB
-
MD5
a662f3bf7f32bd41330d20409246ed9c
-
SHA1
ee4754631a339f56016c4dc23e4cd8dbe34830cf
-
SHA256
f853bc36a85913401ba291b3540c4f661e375db3d35f9d8ff390d18fbe99ccaa
-
SHA512
4faa3673a704d0db8fbd5051e97f082e585b45eceb27d8b9a43d21f6ff7d86ee6467155588134f4e784a7f54404a42e59b92faf007a867555f1f2e5c57ad39a4
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1n8yvvnh:6uaTmkZJ+naie5OTamgEoKxLWuynh
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_USNDeleteJournal -
Detects executables containing commands for clearing Windows Event Logs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_ClearWinLogs -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f853bc36a85913401ba291b3540c4f661e375db3d35f9d8ff390d18fbe99ccaa.exe
Files
-
f853bc36a85913401ba291b3540c4f661e375db3d35f9d8ff390d18fbe99ccaa.exe.exe windows:5 windows x86 arch:x86
2f7da257a3159bdb9faeb823ef872a56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetFileAttributesW
Sleep
GetLastError
LoadLibraryA
DeleteFileW
CloseHandle
RaiseException
GetSystemInfo
LoadLibraryW
CreateThread
SetVolumeMountPointW
GetProcAddress
ExitProcess
FindVolumeClose
CopyFileW
GetConsoleWindow
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
OpenMutexW
GetTickCount
lstrcmpW
GetDriveTypeW
IsDebuggerPresent
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
WaitForMultipleObjects
SetThreadPriority
ReleaseMutex
MoveFileW
GetFileSizeEx
SetFilePointerEx
LocalFree
GetCurrentProcessId
ReadConsoleW
SetEndOfFile
DecodePointer
WriteConsoleW
HeapReAlloc
HeapSize
GetFileAttributesW
WaitForSingleObject
CreateMutexA
SetProcessShutdownParameters
GetModuleFileNameW
GetSystemDefaultUILanguage
lstrlenW
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetPriorityClass
FindFirstVolumeW
FindFirstFileW
ReadFile
GetLocalTime
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetFileAttributesExW
CreateProcessW
CreateProcessA
GetExitCodeProcess
GetFileType
lstrcatW
GetCurrentThread
LCMapStringW
CompareStringW
GetACP
GetCommandLineA
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
ExitThread
MultiByteToWideChar
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
user32
wvsprintfW
ShowWindow
SystemParametersInfoW
wsprintfW
advapi32
OpenServiceA
CryptGenRandom
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
EnumDependentServicesA
CloseServiceHandle
OpenSCManagerA
ControlService
QueryServiceStatusEx
CryptGenKey
CryptDestroyKey
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextA
RegCloseKey
CryptEncrypt
RegCreateKeyExW
CryptExportKey
RegSetValueExW
OpenProcessToken
CryptImportKey
shell32
SHChangeNotify
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
rstrtmgr
RmEndSession
RmStartSession
RmRegisterResources
RmGetList
shlwapi
StrStrIW
PathRemoveExtensionW
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
userenv
RefreshPolicyEx
ws2_32
inet_ntoa
closesocket
getaddrinfo
WSAStartup
socket
connect
WSACleanup
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ