Behavioral task
behavioral1
Sample
ec224e13cbfa4dd81e1438e2881dd089691827a55eb84257078d370b2df7afc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec224e13cbfa4dd81e1438e2881dd089691827a55eb84257078d370b2df7afc3.exe
Resource
win10v2004-20241007-en
General
-
Target
ec224e13cbfa4dd81e1438e2881dd089691827a55eb84257078d370b2df7afc3
-
Size
2.3MB
-
MD5
881d12d3e340c033cdf8231219b64eeb
-
SHA1
a9961ce3d25c313356e18d0d5fc4d9eef7978a09
-
SHA256
ec224e13cbfa4dd81e1438e2881dd089691827a55eb84257078d370b2df7afc3
-
SHA512
c261d2c3e87c153956a74b4e1c0472549e7f3bc5dce3d2b40f2f7dbaa6a6c99174b4c5553c2888eedbcf460638019f4164053cac2a4010e3a7e65578592ad32b
-
SSDEEP
49152:6lhR5no/qrf5EQlRUhNAw6IN0ny2C7OoZGtPENNCr1EzDx9k484:6lhRuiVhG/o80ny2CnZGaHCUD
Malware Config
Signatures
-
Detects Mimic ransomware 1 IoCs
resource yara_rule sample family_mimic -
Mimic family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec224e13cbfa4dd81e1438e2881dd089691827a55eb84257078d370b2df7afc3
Files
-
ec224e13cbfa4dd81e1438e2881dd089691827a55eb84257078d370b2df7afc3.exe windows:6 windows x86 arch:x86
5db996f530c574ab3c34e6ed3f1396a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
Wow64RevertWow64FsRedirection
SetCurrentDirectoryW
ExitProcess
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
GetProcessHeap
CancelIo
CreateTimerQueueTimer
DeleteTimerQueue
GetQueuedCompletionStatus
PostQueuedCompletionStatus
lstrcatW
lstrcpyW
CreateIoCompletionPort
CreateTimerQueue
GetCurrentProcess
SetProcessShutdownParameters
LocalAlloc
GetCurrentThread
LocalFree
GetSystemWindowsDirectoryW
QueryDosDeviceW
SetPriorityClass
RemoveDirectoryW
GetVersionExW
K32GetProcessImageFileNameW
DuplicateHandle
CreateToolhelp32Snapshot
GetExitCodeThread
ProcessIdToSessionId
Process32NextW
K32GetProcessMemoryInfo
Process32FirstW
GetNativeSystemInfo
LoadLibraryW
Module32FirstW
GetWindowsDirectoryW
GetProcAddress
WTSGetActiveConsoleSessionId
CreateProcessW
GetModuleHandleW
CreateRemoteThread
Module32NextW
QueryFullProcessImageNameW
K32GetMappedFileNameW
CreateFileMappingW
GetTickCount
IsWow64Process
VirtualQueryEx
GetExitCodeProcess
InitializeCriticalSectionEx
RaiseException
DecodePointer
GetComputerNameExW
GlobalMemoryStatusEx
ReadProcessMemory
GetStdHandle
GetEnvironmentVariableW
GetFileType
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
QueryPerformanceCounter
GetSystemTimeAsFileTime
FormatMessageW
DeleteFiber
ConvertFiberToThread
FreeLibrary
WideCharToMultiByte
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
WriteConsoleW
HeapSize
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
SetStdHandle
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocalTime
DeleteCriticalSection
GetFileInformationByHandle
SetFileAttributesW
GetFileAttributesW
InitializeCriticalSection
LeaveCriticalSection
SetErrorMode
CreateThread
MapViewOfFile
CreateEventA
CreateFileMappingA
ResetEvent
SetEvent
UnmapViewOfFile
ReleaseMutex
CreateMutexA
CreateMutexW
WaitForMultipleObjects
lstrcmpW
GetCurrentProcessId
Sleep
CreateEventW
WaitForSingleObject
FindClose
lstrlenW
FindNextFileW
ReadFile
FindFirstFileW
AllocConsole
GetConsoleWindow
SetConsoleCP
GetFileTime
GetDriveTypeW
FindNextVolumeW
GetSystemTime
GetVolumePathNamesForVolumeNameW
CopyFileW
SystemTimeToFileTime
FindVolumeClose
DeleteFileW
GetDiskFreeSpaceExW
ExitThread
SetFileTime
FindFirstVolumeW
GetLogicalDrives
GetVolumeInformationW
CreateDirectoryW
GetConsoleOutputCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
SetConsoleCtrlHandler
ResumeThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
lstrcmpiW
MultiByteToWideChar
lstrcpynW
GetFileSizeEx
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
SwitchToThread
TryEnterCriticalSection
AreFileApisANSI
GetFullPathNameW
FindFirstFileExW
GetCurrentDirectoryW
QueryPerformanceFrequency
GetStringTypeW
TerminateProcess
Wow64DisableWow64FsRedirection
EnterCriticalSection
GetCommandLineW
LockResource
CreateFileW
SizeofResource
FlushFileBuffers
MoveFileW
SetFilePointerEx
CloseHandle
GetLastError
SetEndOfFile
DeviceIoControl
WriteFile
LoadLibraryA
user32
GetMessageW
wvsprintfW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
ShowWindow
PeekMessageW
RegisterHotKey
SendMessageTimeoutW
FindWindowW
wsprintfW
PostMessageW
UnregisterHotKey
advapi32
CloseServiceHandle
RevertToSelf
GetTokenInformation
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
ConvertSidToStringSidW
SetSecurityInfo
RegGetValueW
InitializeAcl
OpenProcessToken
RegSetValueExW
RegCreateKeyExW
LookupPrivilegeNameW
RegCloseKey
GetSecurityDescriptorDacl
AdjustTokenPrivileges
GetSecurityDescriptorSacl
LookupPrivilegeValueW
QueryServiceStatusEx
DuplicateTokenEx
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
EqualSid
CreateWellKnownSid
GetUserNameW
LookupAccountSidW
OpenSCManagerW
ControlService
EnumDependentServicesW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
SetThreadToken
shell32
SHEmptyRecycleBinW
SHCreateItemFromParsingName
CommandLineToArgvW
ole32
CoInitializeEx
CoTaskMemFree
CoGetObject
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
ws2_32
setsockopt
WSAGetLastError
inet_ntop
getsockopt
gethostname
inet_ntoa
WSAAddressToStringW
socket
WSAStartup
WSASocketW
send
WSASetLastError
htons
shutdown
gethostbyname
closesocket
WSAIoctl
bind
WSACleanup
recv
shlwapi
PathStripPathW
StrStrW
PathFileExistsW
PathRemoveExtensionW
PathGetArgsW
PathFindExtensionW
StrStrIA
PathRemoveFileSpecW
StrStrIW
iphlpapi
GetIpNetTable
GetAdaptersInfo
netapi32
NetShareEnum
NetApiBufferFree
mpr
WNetOpenEnumW
WNetCloseEnum
WNetGetConnectionW
WNetEnumResourceW
rstrtmgr
RmShutdown
RmStartSession
RmGetList
RmRegisterResources
RmEndSession
everything32
Everything_GetNumResults
Everything_SetRequestFlags
Everything_Exit
Everything_CleanUp
Everything_GetLastError
Everything_QueryW
Everything_GetResultFullPathNameW
Everything_SetSearchW
Everything_SetSort
Everything_DeleteRunHistory
Everything_IsDBLoaded
Everything_GetResultSize
bcrypt
BCryptGenRandom
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 465KB - Virtual size: 464KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ