Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.heoy-b95af59ec0c3d6366d9e621dd100f074b9a4345463696552ac597a73630753b1
-
Size
305KB
-
MD5
ffe869ccb735d254729106272d30a57f
-
SHA1
0d78ed1ee71e0589fbb3ca8900f761657a0efb8f
-
SHA256
b95af59ec0c3d6366d9e621dd100f074b9a4345463696552ac597a73630753b1
-
SHA512
ed100e50e49fb54b0a42d127dd795e4838ddb2c5be310116f3934b96be139a40da86fd29a3f2e5d31363f4761bc7545d8c552c75131b5a63b6b31920cbf8dfc1
-
SSDEEP
6144:ABZPbEkTLCBTvUgldtu34dKXqKjIdoCXdaONE5FhdPrUtgD2:ABZbEkTLCBTvUgldtu34dKXqZ5XdaaEG
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.heoy-b95af59ec0c3d6366d9e621dd100f074b9a4345463696552ac597a73630753b1.exe windows x86
cad9d7a1e55dc4edd87135d205fee319
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ProcCallEngine
ord537
ord644
ord100
ord616
ord581
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE