Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ikyf-afa53529e1d46cf5cceba8e2349c5d8c64ffc381a1b5f1743e99f591c789b573
-
Size
7KB
-
MD5
d5e8b59bbd48f70635237efa5cb420b5
-
SHA1
47e88f0c145fe172e052ece167e04e16d158a0e1
-
SHA256
afa53529e1d46cf5cceba8e2349c5d8c64ffc381a1b5f1743e99f591c789b573
-
SHA512
c55aeeed6957e7b166fbd51846146a422e680b301d08cc2b882afcacb78bd651015d3ba02b2bd1c361253d7a9ba93beee8540a6a80d265f78d44909b7cd46238
-
SSDEEP
192:qW58xvVB7gCkyhyf2QXk6Cr4L5rNlN5lLF2Z/MNcFT:Y9DgwfsOkrNlnlLF2JM
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.ikyf-afa53529e1d46cf5cceba8e2349c5d8c64ffc381a1b5f1743e99f591c789b573.exe windows x86
55259ab7b3e0661cf67de9fd17edee19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CloseHandle
lstrcatA
GetLastError
CopyFileA
DeleteFileA
ExitProcess
HeapReAlloc
lstrcpynA
HeapAlloc
HeapFree
WriteFile
GetProcessHeap
GetVolumeInformationA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcpyA
GetCommandLineA
GetSystemTimeAsFileTime
lstrlenA
SetFilePointer
GetTickCount
CreateFileA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteA
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
DeleteUrlCacheEntry
InternetOpenA
InternetCloseHandle
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ