Behavioral task
behavioral1
Sample
explorer.exe
Resource
win10-20240221-en
General
-
Target
explorer.exe
-
Size
160KB
-
MD5
fdd9f9ae1d24dcc709cd0abcea638ed0
-
SHA1
2fe29b620b51d2258373b12d926a91d0a3720a60
-
SHA256
4134d5d8f7b038e23e7887db56bb3ad295341a1aaf0bebe6be21d901d06dd662
-
SHA512
db995ac8fa51a49e3b9550b0bb4069bbef08a9157d942cffcae24cabb720be01e17afffc9bfb54e95d4883adc6af27c5cb78291d408d0137591eff690669c3ef
-
SSDEEP
3072:5uJ9OlKolUa1U197bzhVsmftsoo4jE8AI8vOMvjEF0Q:5ufj0zi1dNVsmfttjY8LLej40Q
Malware Config
Signatures
-
BlackMatter API Hashing IAT pattern was detected 1 IoCs
This rule detects samples from the BlackMatter family unpacked in memory, identifying code reuse of key functions.
resource yara_rule sample BlackMatterAPIHashIAT -
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule sample family_lockbit -
This rule detects samples from the Lockbit3.0 (and BlackMatter) family unpacked in memory, identifying code reuse of key functions. 1 IoCs
This rule detects samples from the Lockbit3.0 (and BlackMatter) family unpacked in memory, identifying code reuse of key functions.
resource yara_rule sample lb_apihashing_code_pattern -
This rule detects the code pattern of the Stack Strings decryption algorithm. 1 IoCs
This rule detects the code pattern of the Stack Strings decryption algorithm.
resource yara_rule sample lb_stack_string_decrypt -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource explorer.exe
Files
-
explorer.exe.exe windows:5 windows x86 arch:x86
Password: infected
89b43582b27abefb2b74684ab12a2f8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDIBitmap
TextOutW
SetTextColor
SetPixel
GetTextMetricsW
GetTextColor
GetTextCharset
BitBlt
user32
CreateDialogParamW
CreateMenu
DefWindowProcW
EndDialog
GetDlgItem
GetKeyNameTextW
LoadImageW
kernel32
GetModuleHandleW
SetLastError
LoadLibraryW
LoadLibraryExA
FormatMessageW
GetLastError
GetDateFormatW
GetAtomNameW
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ