Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Snocry.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Snocry.exe
Resource
win10v2004-20230220-en
General
-
Target
Trojan-Ransom.Win32.Snocry.dmv-8f9a62a9e43ed55f0fa810737facc6460dc89c41f16f4d610debc8a35babe6b9
-
Size
84KB
-
MD5
420b2f010edbc63a68b2cce2cdf1e5e9
-
SHA1
4cf5072cfe0eb42d387713067e2706902c89b294
-
SHA256
8f9a62a9e43ed55f0fa810737facc6460dc89c41f16f4d610debc8a35babe6b9
-
SHA512
de85edb0217c3d1e615e81154831fe0f3f7c7514f843f253eecf38da09895558b4dc71c1e4141dd196bda7aa75d2c14c85658355a834f98238370df0bea46f35
-
SSDEEP
1536:cYYxci1ZP39zud52ilpPXvlMq12Kpuyjg1kF3mI:+xFyd52ilpPX6q2y8kF3j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Ransom.Win32.Snocry.dmv-8f9a62a9e43ed55f0fa810737facc6460dc89c41f16f4d610debc8a35babe6b9
Files
-
Trojan-Ransom.Win32.Snocry.dmv-8f9a62a9e43ed55f0fa810737facc6460dc89c41f16f4d610debc8a35babe6b9.exe windows x86
9ca09390d9611475fd91baf2b8fe01e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
IsValidLocale
MulDiv
TerminateThread
FormatMessageA
GetProcAddress
FreeLibrary
SetLastError
GetModuleHandleW
GetDateFormatW
GetTimeZoneInformation
VirtualFree
TlsGetValue
SetEnvironmentVariableA
TerminateProcess
DeleteCriticalSection
GetOEMCP
GetCurrentThreadId
SetUnhandledExceptionFilter
OpenMutexA
HeapDestroy
TlsAlloc
WriteFile
GetLastError
GetModuleHandleA
VirtualAlloc
LoadLibraryW
LoadLibraryA
FindResourceA
DebugSetProcessKillOnExit
GetACP
GetHandleInformation
QueryPerformanceCounter
HeapFree
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
HeapReAlloc
HeapAlloc
IsValidCodePage
GetCPInfo
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetTickCount
HeapCreate
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
GetFileType
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WaitForMultipleObjects
GetProfileStringW
GetLocaleInfoA
ResumeThread
ExitProcess
Sleep
IsDebuggerPresent
LocalSize
CompareStringW
FatalAppExitA
GetLocaleInfoW
QueryPerformanceFrequency
GetVersion
GetSystemTimeAsFileTime
GetUserDefaultUILanguage
DosDateTimeToFileTime
UnhandledExceptionFilter
GetCurrentProcess
GetCommandLineA
GetStartupInfoA
user32
GetDialogBaseUnits
SetActiveWindow
DefWindowProcA
GetDlgItem
LoadMenuW
CheckDlgButton
OpenClipboard
GetSysColorBrush
ScreenToClient
MsgWaitForMultipleObjects
LoadAcceleratorsA
TranslateMessage
PostQuitMessage
ReleaseCapture
BeginPaint
LoadIconA
CharNextA
LoadBitmapA
PostMessageA
SetWindowTextW
SetWindowTextA
TranslateAcceleratorA
DeleteMenu
UnhookWinEvent
SetDlgItemInt
DestroyMenu
IsDialogMessageW
IsDialogMessageA
DrawTextW
PostMessageW
LoadImageW
SetForegroundWindow
GetWindowThreadProcessId
InsertMenuItemA
GetSysColor
IsClipboardFormatAvailable
gdi32
CreateCompatibleDC
ExtTextOutA
AbortDoc
GetTextMetricsA
winspool.drv
OpenPrinterW
ClosePrinter
comdlg32
FindTextA
advapi32
RegOpenKeyA
InitializeSecurityDescriptor
OpenSCManagerA
DeleteService
RegDeleteKeyA
StartServiceA
CreateServiceA
shell32
DragFinish
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ