Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Agent.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Agent.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Agent.hsk-77407e2abee23abafc23a7e5c1acc0be2ef6f81735854ca16402111b80026b17
-
Size
111KB
-
MD5
d41fa62f19ef78c34639384b6360e6f0
-
SHA1
68b3d3874d7cd52173f058b21290fe178d67850a
-
SHA256
77407e2abee23abafc23a7e5c1acc0be2ef6f81735854ca16402111b80026b17
-
SHA512
12ae3c6b78a6ee3e59efa96db616f3fc1fac1d5650a36b67c1dc6e4e915aeb528d56055a33e7603d04ce38b9e6a9f36a9b94b8d24310813b01ff1c049370f147
-
SSDEEP
3072:JT32G7mBgwl89uJBDE48uz8FH69xrYAioyGWv+O:JfBuJJd8V69Pi0O
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Agent.hsk-77407e2abee23abafc23a7e5c1acc0be2ef6f81735854ca16402111b80026b17.exe windows x86
a735889f61e8552b7b54cd23518aeace
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
FindClose
GetVersion
SetVolumeLabelW
CreateDirectoryA
GetCommandLineA
WriteConsoleA
GetDriveTypeW
WriteFile
SetEvent
GetModuleHandleA
CreateEventA
GetFileType
IsBadCodePtr
FindAtomA
FindClose
GetSystemTime
SetStdHandle
ResetEvent
RemoveDirectoryA
CreateMailslotA
ReleaseMutex
ExitThread
RemoveDirectoryA
VirtualProtectEx
uxtheme
DrawThemeEdge
CloseThemeData
GetWindowTheme
IsThemeActive
GetThemeColor
CloseThemeData
SetWindowTheme
GetThemeSysSize
GetThemeTextExtent
GetThemeTextMetrics
OpenThemeData
GetThemeRect
DrawThemeBackground
rasmxs
DeviceEnum
DeviceEnum
DeviceEnum
DeviceEnum
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ