TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
e04cdba2c9443b7a859fb328cf19fecd73b6a91d0964b405d56a42ee0721c671.exe
Resource
win11-20240221-en
Target
Ransomware.zip
Size
663KB
MD5
3d5e0c24ed0fc76a0bd3700dfe654966
SHA1
4cd13e895eb81eed4dfa03dd066cffbe406ca0c1
SHA256
062ce5323a2fae6d648446d2254f7df06482d59dc83e97f37adf7cdf185817d0
SHA512
5905377c483f6ddb6989dd060be8636c3da11d65265627b754969fd0498b678ef19399ea0ce157c290dfc3003bbfce9cc82cb70642c3b6e40079788e85ba598b
SSDEEP
12288:idNJMNuEZUJVSiiaG8tzNIMnsJn0n2EXwDDvCm4SHT73f1:oDMNuEZUJn7PsJn0n2EXwDD/4w73N
Checks for missing Authenticode signature.
resource |
---|
unpack001/e04cdba2c9443b7a859fb328cf19fecd73b6a91d0964b405d56a42ee0721c671.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleHandleA
GetProcAddress
ClosePrinter
ImageList_Add
ShellExecuteW
IsEqualGUID
VerQueryValueW
GetDC
VariantInit
NetWkstaGetInfo
RegLoadKeyW
Pie
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE