Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.heoy-d339a1b6114905221e1720021e3c82e00b4ad2eac25c09c6d78d35489433f9f8
-
Size
308KB
-
MD5
1c32944bfe07668946aaabea4fbad5e4
-
SHA1
eeda6d476959aea7951c6b7e18723fa7a1ab356d
-
SHA256
d339a1b6114905221e1720021e3c82e00b4ad2eac25c09c6d78d35489433f9f8
-
SHA512
c4c8963bd26a270d2c32f91a43f23ab4dbbd115ad478da25914f83096b363aa9bd9a41567945d1c204f451ba3a35c18d2b91ac042bed43b4c236ae13c76261d3
-
SSDEEP
6144:4BZPbEkTLCBTvUgldtu34dKXqKjIdoCXdaONE5FhdPrk:4BZbEkTLCBTvUgldtu34dKXqZ5XdaaE8
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.heoy-d339a1b6114905221e1720021e3c82e00b4ad2eac25c09c6d78d35489433f9f8.exe windows x86
cad9d7a1e55dc4edd87135d205fee319
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ProcCallEngine
ord537
ord644
ord100
ord616
ord581
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE