G:\fasm\INCLUDE\API\fasm.pdb
Behavioral task
behavioral1
Sample
3b13b6f1d7cd14dc4a097a12e2e505c0a4cff495262261e2bfc991df238b9b04.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3b13b6f1d7cd14dc4a097a12e2e505c0a4cff495262261e2bfc991df238b9b04.dll
Resource
win10v2004-20250314-en
General
-
Target
30947eb0e32891e8399806e6ecd41e1c3fc89d3db23b9ced6301a2d78aa275a0.zip
-
Size
382KB
-
MD5
f8429a0168cc2b47b22460a255a92523
-
SHA1
77561ae173004fd3f7f8e004cd96dbe64b08758e
-
SHA256
30947eb0e32891e8399806e6ecd41e1c3fc89d3db23b9ced6301a2d78aa275a0
-
SHA512
eea34fd8ac7f5663cf7cc6af2f45c3cfa648c5dcd2d0b5988e9f6d2939b78660b4b7514049e7a8160373cd981c92486d4e4913faa0c9c6aec6ddab8a14ca375b
-
SSDEEP
6144:DitLAMxQ2jkUD/kGNUVDR+oO2cP+X0XvaggfeibmD/SgQBhWqZ1PxmRhy8fC7b/Y:Di1J62Qy6IoO2cGE/a7aD/gVZ1Pao8KQ
Malware Config
Signatures
-
Detected Egregor ransomware 1 IoCs
resource yara_rule static1/unpack001/3b13b6f1d7cd14dc4a097a12e2e505c0a4cff495262261e2bfc991df238b9b04.dll family_egregor -
Egregor family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3b13b6f1d7cd14dc4a097a12e2e505c0a4cff495262261e2bfc991df238b9b04.dll
Files
-
30947eb0e32891e8399806e6ecd41e1c3fc89d3db23b9ced6301a2d78aa275a0.zip.zip
Password: infected
-
3b13b6f1d7cd14dc4a097a12e2e505c0a4cff495262261e2bfc991df238b9b04.dll.dll regsvr32 windows:6 windows x86 arch:x86
0467f09a9ac3a8400cf260fd785be3fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
MessageBoxA
kernel32
GetModuleFileNameW
EncodePointer
GetCommandLineW
LoadLibraryW
GetProcAddress
VirtualAlloc
Sleep
CreateFileW
ExitProcess
VirtualQuery
VirtualFree
GetCurrentProcess
FlushInstructionCache
VirtualProtect
IsBadReadPtr
LoadLibraryA
FreeLibrary
lstrcmpA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
InterlockedPushEntrySList
InterlockedFlushSList
RaiseException
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetCurrentThread
GetACP
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
SetConsoleCtrlHandler
GetStringTypeW
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
CloseHandle
SetFilePointerEx
WriteConsoleW
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
Exports
Exports
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 339KB - Virtual size: 339KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 380KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ