Static task
static1
Behavioral task
behavioral1
Sample
9be3b30f716b9db4ad0e38a13e69a5de5f052d99f37b4283d846871322e5c6ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9be3b30f716b9db4ad0e38a13e69a5de5f052d99f37b4283d846871322e5c6ab.exe
Resource
win10v2004-20240226-en
General
-
Target
9be3b30f716b9db4ad0e38a13e69a5de5f052d99f37b4283d846871322e5c6ab.sample
-
Size
160KB
-
MD5
d1f6a3f6e59abbe7fa4faec0dcb80892
-
SHA1
38ff848e9c6d6d5148c41757cc8937c5fba8446d
-
SHA256
9be3b30f716b9db4ad0e38a13e69a5de5f052d99f37b4283d846871322e5c6ab
-
SHA512
845b469ecd1dc18f39af22f5f58a678547a89de244cad41dc61b56c54922db90cb4e1e571a66b8986f46405343fa10f3e6192e703b96e5ec2579b33b212152e0
-
SSDEEP
3072:TXG/5Nl/X/u2Rlgv0Yo/yCinaFhWmzeC4yrUU1ooooogbj:TkNl/X/u2Rln/gnCNwyrUybj
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9be3b30f716b9db4ad0e38a13e69a5de5f052d99f37b4283d846871322e5c6ab.sample
Files
-
9be3b30f716b9db4ad0e38a13e69a5de5f052d99f37b4283d846871322e5c6ab.sample.exe windows:5 windows x86 arch:x86
e8f3199f7814256fcb47a0bb50fdda40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleWindow
SetConsoleCursorPosition
AllocConsole
GetLogicalDrives
FindFirstFileW
GetFileSizeEx
FindFirstVolumeW
FindNextFileW
GetFinalPathNameByHandleW
WaitForMultipleObjects
SetThreadPriority
GetQueuedCompletionStatus
lstrlenA
FindClose
PostQueuedCompletionStatus
SetFileAttributesW
GetCurrentThread
GetSystemInfo
LoadLibraryW
CreateThread
GetModuleHandleW
TerminateProcess
LocalFree
MoveFileExW
FindVolumeClose
GetCurrentProcessId
SetThreadExecutionState
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
CreateIoCompletionPort
GetDriveTypeW
HeapCreate
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
DecodePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
SetStdHandle
ExitProcess
GetProcAddress
WriteConsoleW
ScrollConsoleScreenBufferW
GetNativeSystemInfo
GetLastError
Sleep
OpenProcess
ReleaseMutex
WaitForSingleObject
CreateMutexW
SetVolumeMountPointW
SetProcessShutdownParameters
GetStdHandle
GetCurrentProcess
SetPriorityClass
GetCommandLineW
GetConsoleScreenBufferInfo
ReadFile
DeleteCriticalSection
GetLocalTime
CloseHandle
lstrcatW
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
lstrlenW
SetFilePointerEx
LCMapStringW
CompareStringW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetFileType
GetStringTypeW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleExW
GetCommandLineA
GetACP
RaiseException
user32
wsprintfA
wsprintfW
ShowWindow
advapi32
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHEmptyRecycleBinW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteW
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
VariantInit
rstrtmgr
RmStartSession
RmGetList
RmRegisterResources
RmEndSession
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
StrStrIW
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ