Static task
static1
Behavioral task
behavioral1
Sample
HEURTrojanRansom.Win32.Agent.pefd52071a6bd149957985186393828367cdb6f7964d665bd9c8a362f46c30d3627.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HEURTrojanRansom.Win32.Agent.pefd52071a6bd149957985186393828367cdb6f7964d665bd9c8a362f46c30d3627.exe
Resource
win10v2004-20230220-en
General
-
Target
HEURTrojanRansom.Win32.Agent.pefd52071a6bd149957985186393828367cdb6f7964d665bd9c8a362f46c30d3627.bin
-
Size
101KB
-
MD5
bcbf0f9f46da15d8d8237c6af1d7034c
-
SHA1
46dcd2bba94e5d54a430af5133c97dbdd75612d1
-
SHA256
d52071a6bd149957985186393828367cdb6f7964d665bd9c8a362f46c30d3627
-
SHA512
e3dcc4efe3289eeafff0f161611ebf89d38289d9c7e96ca76c580e4649d9ebbe1672f59d44be7b94777390fe931dc20b6cf2f8e972afd072ae51b02430987b8f
-
SSDEEP
1536:5XH5EIg4ZoROUjfx2uc15OIM3Epf5RXw40DRMx8qr87X47welr/DLXnJ:5p0WoROUfg5aQNA42RK87X4dlPLXnJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEURTrojanRansom.Win32.Agent.pefd52071a6bd149957985186393828367cdb6f7964d665bd9c8a362f46c30d3627.bin
Files
-
HEURTrojanRansom.Win32.Agent.pefd52071a6bd149957985186393828367cdb6f7964d665bd9c8a362f46c30d3627.bin.exe windows x86
70d8fef95123420268b239d3578610ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
shlwapi
ColorRGBToHLS
SHAutoComplete
PathAppendW
PathRemoveFileSpecW
StrCatChainW
HashData
StrStrNW
StrCatW
comctl32
InitCommonControlsEx
ImageList_DrawIndirect
ImageList_Create
ImageList_GetImageRect
FlatSB_ShowScrollBar
ImageList_SetDragCursorImage
ImageList_DragLeave
shell32
SHChangeNotify
DragFinish
RealShellExecuteA
SHIsFileAvailableOffline
SHOpenFolderAndSelectItems
SHGetSettings
SHGetDesktopFolder
SHAddToRecentDocs
SHSetUnreadMailCountW
wsock32
WSAAsyncGetServByPort
ioctlsocket
connect
ord1106
getservbyname
select
htons
send
socket
recvfrom
shutdown
MigrateWinsockConfiguration
recv
WSAStartup
gethostbyname
closesocket
kernel32
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
CloseHandle
GetSystemTimeAsFileTime
FreeLibrary
TlsSetValue
ReadFile
GetACP
GetStringTypeA
HeapFree
GetOEMCP
GetCommandLineW
FileTimeToDosDateTime
DeleteCriticalSection
OutputDebugStringW
EnterCriticalSection
HeapSize
TlsFree
IsDebuggerPresent
Sleep
QueryPerformanceCounter
GetEnvironmentStringsW
TerminateProcess
lstrcpyW
GetCPInfo
GetLocalTime
GetFileSize
lstrcatW
LoadLibraryA
lstrcmpiA
MultiByteToWideChar
FlushFileBuffers
GetDateFormatW
IsValidCodePage
TlsGetValue
SetEnvironmentVariableA
lstrcmpW
GetFileType
GetTimeZoneInformation
FileTimeToSystemTime
GetPrivateProfileIntW
HeapCreate
GetComputerNameW
GetStartupInfoW
GetStringTypeW
UnmapViewOfFile
GetModuleHandleA
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetUnhandledExceptionFilter
SetLastError
GetTickCount
GetStdHandle
GetLastError
LeaveCriticalSection
ExitProcess
lstrlenW
CreateDirectoryW
CompareStringW
DeleteFileW
CompareStringA
LCMapStringA
lstrlenA
GetPrivateProfileStringW
SetFilePointer
lstrcpynW
GetTimeFormatW
RaiseException
GetProcAddress
GetModuleHandleW
FreeEnvironmentStringsW
LCMapStringW
GetConsoleMode
HeapAlloc
CreateFileA
VirtualAlloc
SetHandleCount
SetStdHandle
TlsAlloc
CreateFileW
GetConsoleCP
advapi32
AddAccessDeniedAceEx
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
SaferComputeTokenFromLevel
RegCreateKeyExW
DuplicateEncryptionInfoFile
user32
SetDlgItemTextW
MessageBoxW
SetFocus
ReleaseCapture
DialogBoxParamW
wsprintfW
SendMessageW
UpdateWindow
CharNextW
SetActiveWindow
SetTimer
KillTimer
GetDlgItem
ShowWindow
CharPrevW
EnableWindow
SetCapture
rpcrt4
I_RpcTransDatagramFree
NdrServerUnmarshall
UuidCreate
NdrServerInitializeMarshall
CStdStubBuffer_IsIIDSupported
RpcAsyncAbortCall
NdrUnmarshallBasetypeInline
NdrFullPointerFree
Sections
.text Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE