Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ijef-d80a3df0c2d998ffb296ccdcb4ba4e1060271fa20da83278019a615d72ad987d
-
Size
28KB
-
MD5
62900703f306c4f05c73b1d8f80e470c
-
SHA1
8701518c3dee4317ee785b307883a7e372e2e4c0
-
SHA256
d80a3df0c2d998ffb296ccdcb4ba4e1060271fa20da83278019a615d72ad987d
-
SHA512
5ef616f34d17ead62fe973e743601c0422a118300ea953766d66273f6054b6b921f521b4f07d4d8fc47880ffbf41c62554abc2996a69f845111947debaadc3d3
-
SSDEEP
768:cLJLRI49FSClUZHXVMqSHJcZMQSEQ1QZe2nKLGU7F:cLTZUxXqqnMb1QILZ
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.ijef-d80a3df0c2d998ffb296ccdcb4ba4e1060271fa20da83278019a615d72ad987d.exe windows x86
d0df27fed029b2967fe8d5ae51089708
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
lstrcatA
lstrcpyA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
Sleep
FindFirstFileA
GetModuleFileNameA
InterlockedDecrement
WideCharToMultiByte
lstrlenW
lstrlenA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
OpenMutexA
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
CopyFileA
DeleteFileA
CreateMutexW
GetLocalTime
ReadFile
SetFilePointer
SetFileAttributesA
WriteFile
GetCurrentDirectoryA
CreateThread
LoadLibraryA
CreateMutexA
MultiByteToWideChar
CreateToolhelp32Snapshot
LocalFree
GetLastError
Process32First
Process32Next
OpenProcess
CreateProcessW
CloseHandle
user32
FindWindowExA
SendMessageA
GetWindowThreadProcessId
wsprintfA
IsWindow
wsprintfW
CharUpperA
FindWindowA
advapi32
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetNamedSecurityInfoA
shell32
SHChangeNotify
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
OleRun
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysAllocStringLen
SysStringByteLen
VariantInit
VariantClear
SysFreeString
VariantCopy
SysStringLen
GetErrorInfo
shlwapi
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
msvcrt
_controlfp
rename
_CxxThrowException
??1type_info@@UAE@XZ
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
sprintf
memcpy
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_EH_prolog
__CxxFrameHandler
memset
strchr
__getmainargs
__p___initenv
exit
_XcptFilter
strlen
_strupr
_wcsupr
wcsstr
_exit
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ