D:\Projects\Exotic Ransomware - Debug\Release\Crypter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aaf01487c83e889aae33f7e8874f1f96eb3ed50b894af513872c10812bff983f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
aaf01487c83e889aae33f7e8874f1f96eb3ed50b894af513872c10812bff983f.exe
Resource
win10v2004-20231222-en
General
-
Target
aaf01487c83e889aae33f7e8874f1f96eb3ed50b894af513872c10812bff983f
-
Size
240KB
-
MD5
4b33216a968a3a12895b87b9ee258637
-
SHA1
1667d33737263cfe955429bd704b1190070026db
-
SHA256
aaf01487c83e889aae33f7e8874f1f96eb3ed50b894af513872c10812bff983f
-
SHA512
9c90f4e5d67d18320042d5233904faf2dfa72d42b343e1f13b5b2a21d35bc0ce66ee6049629585f88cc716416a75bcef2738ae7e38eb22783b7424d1420744e6
-
SSDEEP
3072:UaVQM8PyT4TNk/LDE+qhcJZKBMO30Ho7v/hZqt3Jge3n5H2BTFvKQ3tjNB7GIxL6:lhWNkTYFNB70IU54TUU59GgLLPSCsz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaf01487c83e889aae33f7e8874f1f96eb3ed50b894af513872c10812bff983f
Files
-
aaf01487c83e889aae33f7e8874f1f96eb3ed50b894af513872c10812bff983f.exe windows:6 windows x86 arch:x86
a7865d61935a63d927451a29461faab5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetThreadPriority
GetQueuedCompletionStatus
ResumeThread
PostQueuedCompletionStatus
SetFileAttributesW
CreateEventW
GetExitCodeThread
GetTickCount64
SetEvent
GetCurrentThread
GetSystemInfo
LoadLibraryW
SetVolumeMountPointW
SetFilePointerEx
MoveFileExW
FindVolumeClose
GetCurrentProcessId
SetThreadExecutionState
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
CreateIoCompletionPort
HeapCreate
HeapFree
HeapSize
HeapReAlloc
HeapSetInformation
HeapAlloc
HeapDestroy
GetProcessHeap
CopyFileW
TerminateThread
LoadLibraryA
LocalFree
ReleaseSemaphore
CreateSemaphoreW
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
LCMapStringW
GetTickCount
OpenMutexW
ExitProcess
CreateThread
GetNativeSystemInfo
lstrcatW
GetTimeZoneInformation
Sleep
OpenProcess
ReleaseMutex
GetFileAttributesW
WaitForSingleObject
WaitForMultipleObjects
FindClose
CreateMutexW
GetUserDefaultUILanguage
SetProcessShutdownParameters
RemoveDirectoryW
TerminateProcess
VirtualAlloc
FindFirstVolumeW
FindNextFileW
VirtualFree
SetPriorityClass
FindFirstFileExW
GetFileSizeEx
ReadFile
DeleteCriticalSection
GetLocalTime
GetLastError
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
WriteFile
EnterCriticalSection
lstrcmpiA
FindResourceW
LoadResource
GetCommandLineW
lstrcpyA
LockResource
MultiByteToWideChar
SizeofResource
GetDriveTypeW
GetModuleHandleW
GetComputerNameW
GetProcAddress
CloseHandle
GetDiskFreeSpaceExW
lstrlenA
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetModuleHandleExW
GetStdHandle
RaiseException
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
RtlUnwind
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcess
GetLogicalDrives
lstrcmpiW
lstrcpyW
lstrlenW
GetSystemDefaultUILanguage
FindFirstFileW
WriteConsoleW
user32
ReleaseDC
GetDC
DrawTextW
SystemParametersInfoW
wsprintfW
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
CreateFontW
GetDIBits
GetDeviceCaps
DeleteDC
GetTextExtentPoint32W
SetTextColor
SetBkMode
SetBkColor
DeleteObject
advapi32
CreateProcessAsUserW
GetUserNameW
AllocateLocallyUniqueId
GetSidSubAuthorityCount
AllocateAndInitializeSid
SetServiceStatus
SetEntriesInAclW
SetNamedSecurityInfoW
RegisterServiceCtrlHandlerW
ConvertStringSidToSidW
LogonUserW
FreeSid
StartServiceCtrlDispatcherW
DuplicateTokenEx
GetSidIdentifierAuthority
CreateServiceW
QueryServiceStatus
StartServiceW
RevertToSelf
RegCloseKey
RegEnumKeyW
CloseServiceHandle
ClearEventLogW
OpenSCManagerW
RegCreateKeyExW
CloseEventLog
DeleteService
ControlService
EnumDependentServicesW
RegSetValueExW
SetThreadToken
OpenEventLogW
RegOpenKeyExW
OpenServiceW
QueryServiceStatusEx
RegQueryValueExW
OpenProcessToken
GetTokenInformation
shell32
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteW
SHChangeNotify
ole32
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
SysFreeString
rstrtmgr
RmRegisterResources
RmEndSession
RmGetList
RmStartSession
mpr
WNetAddConnection2W
WNetGetConnectionW
netapi32
NetGetJoinInformation
NetApiBufferFree
DsGetDcNameW
DsGetDcNextW
NetShareEnum
DsGetDcOpenW
DsGetDcCloseW
ws2_32
WSAStartup
WSAGetLastError
closesocket
htonl
getsockopt
gethostname
WSAAddressToStringW
socket
WSAIoctl
bind
WSASocketW
inet_addr
htons
gethostbyname
WSACleanup
setsockopt
ntohl
iphlpapi
GetAdaptersInfo
wininet
HttpOpenRequestW
InternetOpenW
HttpSendRequestW
InternetCloseHandle
InternetConnectW
shlwapi
StrStrIW
StrRChrW
PathAddBackslashW
wnsprintfW
PathFindFileNameW
PathRemoveFileSpecW
PathFindExtensionW
PathRemoveExtensionW
ntdll
NtShutdownSystem
RtlRandomEx
NtQuerySystemInformation
RtlAdjustPrivilege
NtSetInformationProcess
secur32
LsaEnumerateLogonSessions
LsaFreeReturnBuffer
activeds
ord4
ord6
ord9
ord5
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ