Behavioral task
behavioral1
Sample
49D828087CA77ABC8D3AC2E4719719CA48578B265BBB632A1A7A36560EC47F2D.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49D828087CA77ABC8D3AC2E4719719CA48578B265BBB632A1A7A36560EC47F2D.exe
Resource
win10v2004-20220812-en
General
-
Target
49D828087CA77ABC8D3AC2E4719719CA48578B265BBB632A1A7A36560EC47F2D.bin
-
Size
389KB
-
MD5
ba95a2f1f1f39a24687ebe3a7a7f7295
-
SHA1
b4da6af343b27594fee7109a02ef699ba52f6e46
-
SHA256
49d828087ca77abc8d3ac2e4719719ca48578b265bbb632a1a7a36560ec47f2d
-
SHA512
4611ac65840c3ecee27f8821705f378de09ddbf1130476517f857abf3b1cf0f169ca618c82cc905d56f224019dbb01795ca458453a64cc51e100f7bbfc2781ee
-
SSDEEP
6144:SKmb+LOzyGKPCVqlea2MqxOnsAOK1RUa+jE6S3qVFvxTn:SfaLQyGK6kAa2XgsA1RUa+jE6S3qRT
Malware Config
Signatures
-
Detects Yanluowang ransomware 1 IoCs
Processes:
resource yara_rule sample family_yanluowang -
Yanluowang family
Files
-
49D828087CA77ABC8D3AC2E4719719CA48578B265BBB632A1A7A36560EC47F2D.bin.exe windows x86
380467bc2cc16b8ce64d4802632fe491
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32FirstW
CloseHandle
GetLogicalDriveStringsA
SetFilePointerEx
LocalFree
SystemTimeToFileTime
GetSystemTime
MoveFileW
GetDriveTypeW
CreateFileA
LocalAlloc
SetFilePointer
FindNextFileA
SetFileTime
TerminateProcess
WriteFile
GetCurrentProcess
FindFirstFileA
Process32NextW
GetLastError
CreateToolhelp32Snapshot
OpenProcess
CreateFileW
GetCurrentDirectoryA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
GetFileSizeEx
GetModuleHandleW
GetProcAddress
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
InterlockedPushEntrySList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapFree
GetFileType
GetFileAttributesExW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
HeapReAlloc
HeapSize
FindClose
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
SetStdHandle
WriteConsoleW
FindFirstFileW
CreateEventW
ReadFile
advapi32
CryptGenRandom
CryptAcquireContextA
CryptReleaseContext
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextW
SetNamedSecurityInfoA
CryptEncrypt
AllocateAndInitializeSid
SetEntriesInAclW
OpenProcessToken
FreeSid
shell32
ShellExecuteA
crypt32
CryptStringToBinaryA
CryptDecodeObjectEx
CryptBinaryToStringA
CryptImportPublicKeyInfo
Sections
.text Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ