Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Agent.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Agent.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Agent.hsf-c3ef6f6c693cb561f3174a1fdb50101176afdf8dc8db572cfebae97e75a0a37c
-
Size
111KB
-
MD5
e4b3c2510849b92877f92a283141e90c
-
SHA1
41d99cf6c87f24251132dc9ac4bd1437f1cd0c54
-
SHA256
c3ef6f6c693cb561f3174a1fdb50101176afdf8dc8db572cfebae97e75a0a37c
-
SHA512
56c692adec0a7262d43d6d915cc872ef9d5cf8d538bb46e010905410c3d3339a4785dc850cf189fb049c209f5ead46f8fa4bc8c9f2d47ab26e53ef2872aa95b6
-
SSDEEP
3072:BvKy0TWvIHKU1BNJYgas8e30rRHFHwM4GgAF/fI:50ivrwBNHd6RVwrGhf
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Agent.hsf-c3ef6f6c693cb561f3174a1fdb50101176afdf8dc8db572cfebae97e75a0a37c.exe windows x86
de510fc12afad1b2ab0d65c1e9d5e40e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
VirtualProtectEx
RemoveDirectoryA
RemoveDirectoryA
CreateDirectoryA
WriteFile
SetVolumeLabelW
GetCommandLineA
IsBadCodePtr
CreateSemaphoreW
ExitThread
ReleaseMutex
FindClose
WriteConsoleA
GetModuleHandleA
SetStdHandle
SetEvent
FindAtomA
GetFileType
GetVersion
FindClose
GetDriveTypeW
ResetEvent
CreateMailslotA
GetSystemTime
uxtheme
DrawThemeEdge
GetThemeRect
IsThemeActive
CloseThemeData
SetWindowTheme
GetThemeColor
GetWindowTheme
GetThemeTextExtent
GetThemeSysSize
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemeTextMetrics
pstorsvc
Start
Start
Start
Start
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ