C:\Users\john\Documents\Visual Studio 2008\Projects\EncryptFile -svcV2\Release\EncryptFile.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2b9838da7edb0decd32b086e47a31e8f5733b5981ad8247a2f9508e232589bff.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b9838da7edb0decd32b086e47a31e8f5733b5981ad8247a2f9508e232589bff.exe
Resource
win10v2004-20240709-en
General
-
Target
617a0ef26dacf4c492487684212684360431f39c8e69748ba74dab77109b4a1e
-
Size
577KB
-
MD5
7cc07197515a7d3a56ebea4c6239d216
-
SHA1
1cd02ab0bd86fe78f5c2765020861e46bdf0593b
-
SHA256
617a0ef26dacf4c492487684212684360431f39c8e69748ba74dab77109b4a1e
-
SHA512
1639c403dee829039c997835776fcabb3fb76f9a8f3f825600ec3a6493729b8fe4a7bc7bdeebae0bfbf401bd62c356c2b5a84777bf8ca45ff2d6751401ac65e8
-
SSDEEP
12288:2zhcvYAV9wRl962IKl40FfZGsmLmAt0HqsFOTDuIAXSIMn0CWbnAxc/e:2zhg9w0S40KsmLhqj6gHK0CW7Er
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/2b9838da7edb0decd32b086e47a31e8f5733b5981ad8247a2f9508e232589bff.exe
Files
-
617a0ef26dacf4c492487684212684360431f39c8e69748ba74dab77109b4a1e.7z
Password: infected
-
2b9838da7edb0decd32b086e47a31e8f5733b5981ad8247a2f9508e232589bff.exe.exe windows:5 windows x86 arch:x86
f8b8e20e844ccd50a8eb73c2fca3626d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
CloseHandle
LoadLibraryA
VirtualAlloc
GetProcAddress
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedExchangeAdd
GetModuleHandleW
GetVersion
MultiByteToWideChar
WriteFile
GetFileType
GetStdHandle
GetSystemTimeAsFileTime
DeleteFiber
GetTickCount
QueryPerformanceCounter
GlobalMemoryStatus
WideCharToMultiByte
ConvertFiberToThread
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
GetEnvironmentVariableW
LoadLibraryW
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLastError
DeleteFileA
Sleep
ExitProcess
GetCommandLineA
HeapReAlloc
SetConsoleCtrlHandler
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetFullPathNameA
GetCurrentDirectoryA
GetModuleFileNameA
SetHandleCount
GetStartupInfoA
SetFilePointer
ReadFile
RtlUnwind
GetConsoleCP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
SetLastError
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleA
FlushFileBuffers
SetStdHandle
HeapSize
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileW
SetEndOfFile
GetProcessHeap
VirtualFree
GetCurrentProcess
FreeLibrary
CreateFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
FindFirstFileA
lstrcatA
GetFileAttributesA
GetDriveTypeA
GetLogicalDrives
HeapAlloc
lstrcpynA
advapi32
OpenServiceA
CryptDecrypt
CryptCreateHash
CryptSetHashParam
CryptSignHashW
CryptDestroyHash
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptDestroyKey
CryptEnumProvidersW
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
RegisterEventSourceW
ReportEventW
DeregisterEventSource
CloseServiceHandle
StartServiceCtrlDispatcherA
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
ws2_32
closesocket
recv
WSASetLastError
send
WSAGetLastError
WSACleanup
user32
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
crypt32
CertCloseStore
CertFreeCertificateContext
CertEnumCertificatesInStore
CertFindCertificateInStore
CertOpenStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
Sections
.text Size: 954KB - Virtual size: 953KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ