Behavioral task
behavioral1
Sample
87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe
Resource
win10v2004-20231215-en
General
-
Target
87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.7z
-
Size
95KB
-
MD5
996ed062aaf09a754de4b1b67c14631f
-
SHA1
d4c43c642461724bc0d17fe60e2c8f5ab86e2743
-
SHA256
853ed24a495d866d64a922922e5d5329ed165fe102cef00007095ee92ba3746d
-
SHA512
bd0071a69c7c74c1fac3325bd8b0165dd3cc3010fe2a8ebed501ce11776137c80bffd4b842b18da1af58bad1930df0ecfdb7778aa39f3c893778fbcb05c6dfdb
-
SSDEEP
1536:lqrJTZI43giUp3fiWL5O6sNs6rEHb4YM+SO0W7/3QMNp7s+nzXaiqKZG4Io:lqTZVmMEgTEHa+VP1Ds+nTai+0
Malware Config
Signatures
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9 family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9
Files
-
87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.7z.7z
Password: infected
-
87b76f35740262abb8da224b94779ff56eb6346318b4f9fb1988a59a72a4e6c9.exe windows:5 windows x86 arch:x86
89b43582b27abefb2b74684ab12a2f8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDIBitmap
TextOutW
SetTextColor
SetPixel
GetTextMetricsW
GetTextColor
GetTextCharset
BitBlt
user32
CreateDialogParamW
CreateMenu
DefWindowProcW
EndDialog
GetDlgItem
GetKeyNameTextW
LoadImageW
kernel32
GetModuleHandleW
SetLastError
LoadLibraryW
LoadLibraryExA
FormatMessageW
GetLastError
GetDateFormatW
GetAtomNameW
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ