Behavioral task
behavioral1
Sample
2024-10-09_6dcf4e9400c3eadb0ce58e7558957d8a_mimic-ransomware_revil.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_6dcf4e9400c3eadb0ce58e7558957d8a_mimic-ransomware_revil.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_6dcf4e9400c3eadb0ce58e7558957d8a_mimic-ransomware_revil
-
Size
2.1MB
-
MD5
6dcf4e9400c3eadb0ce58e7558957d8a
-
SHA1
05630c3157ad9c552df14804054bd63e004b7482
-
SHA256
ed6cf30ee11b169a65c2a27c4178c5a07ff3515daa339033bf83041faa6f49c1
-
SHA512
156a79ee3fde8e79b5ed99c1eb00ba953a841e9ad83c9569870004f10efb5e664d81638809fca9c68a5d52be13311605e7a0645e4a55e065200a3405f79c0025
-
SSDEEP
49152:2QX4XDWEbuWZziDdf/6BeIIvt84c9tPXSpEONhrk6NG/y92I9:2QX4XxxixCBeIIvnc99ENG/yF9
Malware Config
Signatures
-
Detects Mimic ransomware 1 IoCs
resource yara_rule sample family_mimic -
Mimic family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_6dcf4e9400c3eadb0ce58e7558957d8a_mimic-ransomware_revil
Files
-
2024-10-09_6dcf4e9400c3eadb0ce58e7558957d8a_mimic-ransomware_revil.exe windows:6 windows x86 arch:x86
2c4818f5e9c4b9e1df3f4636304ba31d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyW
CreateIoCompletionPort
CreateTimerQueue
GetCurrentProcess
SetProcessShutdownParameters
LocalAlloc
GetCurrentThread
LocalFree
GetSystemWindowsDirectoryW
QueryDosDeviceW
FindFirstFileW
SetPriorityClass
FindNextFileW
TerminateProcess
RemoveDirectoryW
FindClose
GetVersionExW
K32GetProcessImageFileNameW
DuplicateHandle
CreateToolhelp32Snapshot
GetExitCodeThread
ProcessIdToSessionId
Process32NextW
Process32FirstW
GetNativeSystemInfo
LoadLibraryW
Module32FirstW
GetWindowsDirectoryW
GetProcAddress
WTSGetActiveConsoleSessionId
CreateProcessW
GetModuleHandleW
CreateRemoteThread
Module32NextW
QueryFullProcessImageNameW
K32GetMappedFileNameW
CreateFileMappingW
GetTickCount
lstrcmpW
IsWow64Process
VirtualQueryEx
InitializeCriticalSectionEx
RaiseException
DecodePointer
GetComputerNameExW
GlobalMemoryStatusEx
ReadProcessMemory
GetStdHandle
GetEnvironmentVariableW
GetFileType
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
QueryPerformanceCounter
GetSystemTimeAsFileTime
FormatMessageW
DeleteFiber
ConvertFiberToThread
FreeLibrary
LoadLibraryA
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
WriteConsoleW
HeapSize
CreateTimerQueueTimer
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
CancelIo
GetProcessHeap
HeapAlloc
HeapFree
AllocConsole
GetCurrentProcessId
SetConsoleCP
SetCurrentDirectoryW
Wow64RevertWow64FsRedirection
Sleep
OpenProcess
Wow64DisableWow64FsRedirection
WideCharToMultiByte
GetLocalTime
DeleteCriticalSection
GetFileInformationByHandle
lstrcatW
GetFileAttributesW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
MapViewOfFile
CreateEventA
CreateFileMappingA
ResetEvent
SetEvent
CreateEventW
UnmapViewOfFile
ReleaseMutex
WaitForSingleObject
CreateMutexA
CreateMutexW
WaitForMultipleObjects
GetFileTime
GetDriveTypeW
FindNextVolumeW
GetSystemTime
ReadFile
GetVolumePathNamesForVolumeNameW
CopyFileW
SystemTimeToFileTime
FindVolumeClose
SetVolumeMountPointW
GetDiskFreeSpaceExW
ExitThread
SetFileTime
DeviceIoControl
IsValidCodePage
GetTimeZoneInformation
SetStdHandle
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleOutputCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
SetConsoleCtrlHandler
ExitProcess
ResumeThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
lstrlenW
FindFirstVolumeW
GetLogicalDrives
GetVolumeInformationW
CreateDirectoryW
lstrcmpiW
MultiByteToWideChar
CreateFileW
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
SwitchToThread
TryEnterCriticalSection
PostQueuedCompletionStatus
GetQueuedCompletionStatus
SetFileAttributesW
AreFileApisANSI
GetFullPathNameW
FindFirstFileExW
GetCurrentDirectoryW
QueryPerformanceFrequency
GetStringTypeW
DeleteTimerQueue
GetCommandLineW
GetFileSizeEx
GetModuleFileNameW
FlushFileBuffers
MoveFileW
SetFilePointerEx
CloseHandle
DeleteFileW
GetLastError
SetEndOfFile
WriteFile
SetEnvironmentVariableW
user32
GetProcessWindowStation
wsprintfW
wvsprintfW
GetUserObjectInformationW
MessageBoxW
advapi32
CryptSetHashParam
RevertToSelf
GetTokenInformation
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
SetSecurityInfo
InitializeAcl
OpenProcessToken
RegSetValueExW
RegCreateKeyExW
LookupPrivilegeNameW
RegCloseKey
GetSecurityDescriptorDacl
AdjustTokenPrivileges
GetSecurityDescriptorSacl
LookupPrivilegeValueW
QueryServiceStatusEx
DuplicateTokenEx
EnumServicesStatusW
OpenServiceW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegGetValueW
EqualSid
CreateWellKnownSid
GetUserNameW
LookupAccountSidW
CloseServiceHandle
OpenSCManagerW
ControlService
EnumDependentServicesW
ChangeServiceConfigW
RegDeleteValueW
SetThreadToken
shell32
SHCreateItemFromParsingName
SHEmptyRecycleBinW
CommandLineToArgvW
ole32
CoSetProxyBlanket
CoTaskMemFree
CoGetObject
CoInitializeEx
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
VariantInit
SysFreeString
VariantClear
shlwapi
PathFileExistsW
StrStrIW
PathRemoveFileSpecW
StrStrIA
PathFindExtensionW
PathGetArgsW
PathRemoveExtensionW
PathStripPathW
StrStrW
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
ws2_32
WSAGetLastError
socket
WSAStartup
WSASocketW
shutdown
gethostbyname
closesocket
setsockopt
bind
WSACleanup
recv
send
WSASetLastError
inet_ntop
getsockopt
gethostname
inet_ntoa
WSAIoctl
WSAAddressToStringW
htons
iphlpapi
GetIpNetTable
GetAdaptersInfo
netapi32
NetApiBufferFree
NetShareEnum
mpr
WNetGetConnectionW
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
rstrtmgr
RmShutdown
RmStartSession
RmRegisterResources
RmGetList
RmEndSession
everything32
Everything_GetNumResults
Everything_GetResultSize
Everything_DeleteRunHistory
Everything_SetSort
Everything_SetSearchW
Everything_GetResultFullPathNameW
Everything_QueryW
Everything_GetLastError
Everything_CleanUp
Everything_Exit
Everything_IsDBLoaded
Everything_SetRequestFlags
bcrypt
BCryptGenRandom
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 453KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ