DllInstall
DllRegisterServer
Start
Behavioral task
behavioral1
Sample
c09b509699aeef71f3e205d53c5f4ff71cb48570.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c09b509699aeef71f3e205d53c5f4ff71cb48570.dll
Resource
win10v2004-20230221-en
Target
c09b509699aeef71f3e205d53c5f4ff71cb48570.rl
Size
77KB
MD5
0aacf2c41ba9b872a52055ffcaeaef15
SHA1
c09b509699aeef71f3e205d53c5f4ff71cb48570
SHA256
31630d16f4564c7a214a206a58f60b7623cd1b3abb823d10ed50aa077ca33585
SHA512
d259de51d22d72d27d5947530317661b97ba8fcc36e7a2ad4835e98bc311ef1aa5964f939660733171934f6aefa82d8b76a6f9f04137e1aeca63d592f0fb26ec
SSDEEP
1536:rADwfmySY6FIsr4XSZ32tcOGwpin2NI2F4cd:UDwTF6+srGi32tcOGwpin2NMcd
resource | yara_rule |
---|---|
sample | RANSOM_mountlocker |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapReAlloc
GetCurrentProcessId
WideCharToMultiByte
SetErrorMode
CreateMutexW
GetWindowsDirectoryW
GetFileSizeEx
UnmapViewOfFile
GetTickCount64
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
Sleep
CreateThread
lstrcmpiW
TerminateProcess
GetDriveTypeW
GetCommandLineW
GetModuleFileNameW
ExitProcess
lstrlenA
GetComputerNameA
GetTempPathW
CreateProcessW
GetTickCount
GetConsoleScreenBufferInfo
GetStdHandle
WriteConsoleA
SetConsoleCursorPosition
AllocConsole
GetSystemDirectoryW
OpenProcess
GetCurrentProcess
CloseHandle
CreateFileW
WriteFile
lstrcpyW
GetProcessHeap
LocalFree
HeapAlloc
lstrcatW
GetLastError
FindClose
lstrlenW
FindNextFileW
HeapFree
FindFirstFileW
MoveFileW
GetVolumeInformationW
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptReleaseContext
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetEntriesInAclA
AllocateAndInitializeSid
FreeSid
SetNamedSecurityInfoW
GetNamedSecurityInfoW
CryptAcquireContextW
_vsnprintf
_getch
memcpy
memset
SHRegSetUSValueW
StrStrIA
StrStrIW
StrCmpIW
ZwQuerySystemInformation
wsprintfW
CharLowerW
DllInstall
DllRegisterServer
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ