Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Fury.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Fury.exe
Resource
win10v2004-20230220-en
General
-
Target
Trojan-Ransom.Win32.Fury.n-f2dbf29985a759e73c6a515422e218e6b0a1a844a327917428a1f9a1248f2320
-
Size
81KB
-
MD5
03efa23cb13898fdfda7821ea7dc5e10
-
SHA1
e25e2f68f0c159378f133d0e161a980d7f148a91
-
SHA256
f2dbf29985a759e73c6a515422e218e6b0a1a844a327917428a1f9a1248f2320
-
SHA512
eb7afaac956b2781c4551cec46c97c4b9dee08b29844f9551ad8ff7fe766f48a9897288a3f8f514789f4f3dabc4d00ec2284c5602b4b253ca7cfc8ac393280c5
-
SSDEEP
1536:WqcJ/2POlymkGECwdqnUzyQon3f+RltHWSqTWfY:WPynRDcnUzyfn3WRltH7XfY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Ransom.Win32.Fury.n-f2dbf29985a759e73c6a515422e218e6b0a1a844a327917428a1f9a1248f2320
Files
-
Trojan-Ransom.Win32.Fury.n-f2dbf29985a759e73c6a515422e218e6b0a1a844a327917428a1f9a1248f2320.exe windows x86
6e4610f91fe72e342925be31ea0e87c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultLCID
GetCommandLineA
WideCharToMultiByte
lstrcpynW
RtlMoveMemory
VirtualAlloc
GetCurrentProcessId
GetHandleInformation
DecodeSystemPointer
GetCommConfig
DefineDosDeviceA
DisableThreadLibraryCalls
LoadLibraryA
LocalAlloc
GetThreadLocale
LockResource
GetProcAddress
FindResourceA
GetCurrentThread
CreateFileA
GetModuleHandleW
VirtualFree
GetStringTypeW
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetLocaleInfoA
HeapSize
RtlUnwind
HeapReAlloc
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetSystemTime
lstrcatW
SetEndOfFile
GlobalAlloc
FormatMessageA
FreeEnvironmentStringsA
CompareStringA
GetFullPathNameA
GetEnvironmentVariableA
HeapDestroy
GetStringTypeA
SetStdHandle
FatalAppExitA
RaiseException
WriteFileEx
GetVersion
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoA
SetUnhandledExceptionFilter
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
user32
DefWindowProcA
GetCursorPos
GetKeyboardLayout
SetWindowPos
CheckRadioButton
GetSysColor
AttachThreadInput
LoadImageW
CheckMenuRadioItem
SetTimer
DialogBoxParamW
SendMessageA
SetClipboardData
SetDlgItemTextA
GetDlgItemTextA
DestroyMenu
GetDesktopWindow
GetDlgItemTextW
SendMessageW
TranslateAcceleratorW
GetMenuItemCount
TrackPopupMenu
CreateDialogParamA
gdi32
SelectObject
DeleteObject
SetDIBits
CreateCompatibleDC
GetObjectW
EndPage
SetWindowExtEx
SetBkColor
StartDocA
DeleteDC
advapi32
RegQueryValueExW
RegOpenKeyA
RegCreateKeyA
QueryServiceStatus
LookupPrivilegeValueA
shell32
Shell_NotifyIconA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ