Static task
static1
Behavioral task
behavioral1
Sample
42be806e8f0dbb8a37269e32a92785ad08cc26a2928eabdcde5f865b85b6ccac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42be806e8f0dbb8a37269e32a92785ad08cc26a2928eabdcde5f865b85b6ccac.exe
Resource
win10v2004-20240226-en
General
-
Target
42be806e8f0dbb8a37269e32a92785ad08cc26a2928eabdcde5f865b85b6ccac
-
Size
1.4MB
-
MD5
fa3589b53159c46e38b1559efea4c2d1
-
SHA1
7775fa17ea18b78c6bda52de1f96dab1d9ff3232
-
SHA256
42be806e8f0dbb8a37269e32a92785ad08cc26a2928eabdcde5f865b85b6ccac
-
SHA512
3d5ce20aeec5d01fa427a1b61ed5144f6aa6c2cb7dc44d2e0c345560dbc13175380f93315a2bda74cd47bc8508b672f9c098e1f5501b384d55ddc09848fddd84
-
SSDEEP
3072:t2uS8JpXKmOjoeW6hSF+Y49hwE2PQBqgh215zWpiIvCEKliX5V4a5sdxBhi7gt99:tDSAXMjz21gjKvQ5dj2qnmF+5YA
Malware Config
Signatures
-
Detects executables referencing combination of virtualization drivers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing many IR and analysis tools 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_References_SecTools -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42be806e8f0dbb8a37269e32a92785ad08cc26a2928eabdcde5f865b85b6ccac
Files
-
42be806e8f0dbb8a37269e32a92785ad08cc26a2928eabdcde5f865b85b6ccac.exe windows:4 windows x86 arch:x86
6c5af4c773e5eec112fb2d6c9b7bdef7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
iphlpapi
GetAdaptersAddresses
kernel32
CheckRemoteDebuggerPresent
DebugActiveProcess
DebugActiveProcessStop
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCurrentProcessId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTickCount64
GetTickCount
GlobalMemoryStatusEx
InitializeCriticalSection
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
OutputDebugStringW
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__initenv
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_initterm
_iob
_onexit
abort
calloc
exit
fprintf
free
fwrite
malloc
memcmp
memcpy
signal
strcmp
strlen
strncmp
vfprintf
_wcsicmp
_stricmp
user32
EnumDisplayMonitors
EnumWindows
GetCursorPos
GetLastInputInfo
GetMonitorInfoW
GetSystemMetrics
ws2_32
__WSAFDIsSet
closesocket
connect
htons
inet_pton
ioctlsocket
select
socket
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 584B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ