Static task
static1
Behavioral task
behavioral1
Sample
Decrypter.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Decrypter.exe
Resource
win10v2004-20231215-en
General
-
Target
Decrypter.exe
-
Size
5.6MB
-
MD5
47bb601285451ce9203635fa1c2d2c15
-
SHA1
247230e8f52404b5c0daaf5393048bd17ec45f4e
-
SHA256
74c3919d7689e888dc2c60f5c18ce8a16200d679a58b7f6b0dda6a006ffdfbf8
-
SHA512
9182b47edf0cd540570ce755f0bc7f6fae86424fe7163124c23beb7636a3b6af4a093f3cec7041ad11024d5a830203b544cf4b52c62a5d4cf58d4fae1e2ff9c0
-
SSDEEP
98304:eemDkRqxGWszlYP5LZttoZ7HM9N8lrSHhgW8oJolDbekAmbTF2U6u3CpESUy:zBz6P5Zb649N8l+IZ9BAmHF6uCpEpy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Decrypter.exe
Files
-
Decrypter.exe.exe windows:6 windows x86 arch:x86
Password: Smor123!
5f8f401e3c8b2aec6bbcac405e12e11f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
GetCurrentProcessId
SetLastError
GetModuleHandleExW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStdHandle
GetEnvironmentVariableW
GetFileType
WriteFile
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
DeleteFiber
ConvertFiberToThread
FreeLibrary
ExpandEnvironmentStringsW
LoadLibraryW
WideCharToMultiByte
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
HeapSize
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
GetProcessHeap
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
MulDiv
SetThreadExecutionState
GetSystemInfo
GetModuleHandleA
ReleaseMutex
CreateMutexA
SetErrorMode
LocalFree
GlobalFree
DeleteFileW
GlobalAlloc
GetLastError
SetFileAttributesW
GetFileAttributesW
LocalAlloc
FindClose
GetCurrentProcess
FindNextFileW
FindFirstFileW
GetLogicalDrives
MoveFileExW
SetEndOfFile
SetFilePointerEx
CloseHandle
Sleep
CreateFileW
LoadLibraryA
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
FlushFileBuffers
GetACP
HeapReAlloc
ExitThread
HeapFree
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
EncodePointer
DecodePointer
CreateEventW
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleFileNameW
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RaiseException
RtlUnwind
ExitProcess
SetConsoleCtrlHandler
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapAlloc
user32
DrawTextW
GetDlgItem
LoadIconA
PostQuitMessage
GetUserObjectInformationW
GetProcessWindowStation
DefWindowProcW
GetMessageA
DispatchMessageA
LoadCursorA
SetWindowPos
MessageBoxW
PostMessageA
CreateWindowExW
SendMessageW
GetSystemMetrics
SetWindowTextW
ShowWindow
SetWindowLongA
GetWindowTextA
RegisterClassW
GetWindowLongA
TranslateMessage
gdi32
GetStockObject
SetTextColor
SetBkMode
SetDCBrushColor
SetBkColor
DeleteObject
CreateSolidBrush
RoundRect
SelectObject
advapi32
RegDeleteKeyA
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CheckTokenMembership
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
SetEntriesInAclA
AdjustTokenPrivileges
RegCloseKey
SetFileSecurityW
AllocateAndInitializeSid
LookupPrivilegeValueA
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
shell32
SHGetFolderPathW
mpr
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
winmm
waveOutSetVolume
PlaySoundA
bcrypt
BCryptGenRandom
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 455KB - Virtual size: 455KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ