Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.heoy-fa43b75dad77fa6e3d06a80dc63f21282f422119c1333d12b86994739c66d733
-
Size
364KB
-
MD5
ec23bd752342f68ed5f16d160a6b4200
-
SHA1
f3e14462b97c64e230cfe58217396cc63ca66ee1
-
SHA256
fa43b75dad77fa6e3d06a80dc63f21282f422119c1333d12b86994739c66d733
-
SHA512
99d729c2f5901bb40c3421bbafc3fa737c777b8852f8a0a43e9081718881b3c64e0ef0a1bdb922cf2c849ddf2f8f3a3c2cc2613bcd1cbb6e98b5017e68938c79
-
SSDEEP
6144:uBZPbEkTLCBTvUgldtu34dKXqKjIdoCXdaONE5FhdPrLBKp1BfrC:uBZbEkTLCBTvUgldtu34dKXqZ5XdaaEx
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.heoy-fa43b75dad77fa6e3d06a80dc63f21282f422119c1333d12b86994739c66d733.exe windows x86
cad9d7a1e55dc4edd87135d205fee319
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ProcCallEngine
ord537
ord644
ord100
ord616
ord581
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE