Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Agent.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Agent.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Agent.hsf-e7d4b6abcefea2387162598fcaf59bfd67f127d064d1999ae3f2b2dc16dce29d
-
Size
749KB
-
MD5
9fa84f1d4dbcf7850967dae71107251f
-
SHA1
451778c178cd4907821c450c6306ac4adda66443
-
SHA256
e7d4b6abcefea2387162598fcaf59bfd67f127d064d1999ae3f2b2dc16dce29d
-
SHA512
734d061da91f2f00e33bcfce9c9fa2c39b14945abff2709237ff04d64fb3a27023ee6e366cd28cb596ad09dff1d19ded4a043221bef0359db77ee0886499087c
-
SSDEEP
12288:E/0tE0F6RGnuCFRsWuiK66wROIhelczaF01FIM/iM8R2jrFnG0g11wpUw1+2crP8:Kw8/+vn6M9hKczaWHxjrFrpUwkR6v
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Agent.hsf-e7d4b6abcefea2387162598fcaf59bfd67f127d064d1999ae3f2b2dc16dce29d.exe windows x86
0787524038c8262aa470ee43f9050c0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetCommandLineA
SetStdHandle
FindClose
GetSystemTime
WriteFile
GetModuleHandleA
HeapFree
CreateSemaphoreW
GetVersion
GetFileType
VirtualProtectEx
GetDriveTypeW
SetVolumeLabelA
ResetEvent
CreatePipe
FindAtomA
RemoveDirectoryA
IsBadWritePtr
SetEvent
ResumeThread
RemoveDirectoryA
CreateDirectoryA
ExitThread
WriteConsoleA
uxtheme
SetWindowTheme
CloseThemeData
GetThemeTextExtent
GetThemeColor
IsThemeActive
CloseThemeData
GetThemeSysSize
GetThemeTextMetrics
DrawThemeBackground
DrawThemeEdge
OpenThemeData
GetThemeBool
GetWindowTheme
pstorsvc
Start
Start
Start
Start
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ