e:\work\wts\Release\wts.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_a12b5783d21fe47906d60aef76f9b3a6_bkransomware_revil.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-30_a12b5783d21fe47906d60aef76f9b3a6_bkransomware_revil.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_a12b5783d21fe47906d60aef76f9b3a6_bkransomware_revil
-
Size
1.4MB
-
MD5
a12b5783d21fe47906d60aef76f9b3a6
-
SHA1
bb02fd772a5ebac1cccf299e49ae55734380b7fe
-
SHA256
6a2004f0b78adc49bfb5e8298ffe899148d275b477647028f5213ea9d53609d3
-
SHA512
957c45a1fb76c14152cb345ac4bf8f302bdfdc55b7f2d4dd79eabad9af99a12dd7494d655eb52b5a72a6e15e486798793f15d7a4973c11d2dbbd4ec51a94c183
-
SSDEEP
24576:e1+KpPDRdrtQQmVKRuNMZRI3NodMiDx6ZP4mPeYgDU7PnfdYP7OX8GupZu:CfTdN92Xn1YP7OX8GupZu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-30_a12b5783d21fe47906d60aef76f9b3a6_bkransomware_revil
Files
-
2024-04-30_a12b5783d21fe47906d60aef76f9b3a6_bkransomware_revil.exe windows:6 windows x86 arch:x86
ef27c270aa24ce4aab5837a9ea3ce5b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAStartup
accept
__WSAFDIsSet
htonl
listen
shutdown
WSASetLastError
bind
recv
send
setsockopt
select
WSAGetLastError
connect
htons
socket
closesocket
iphlpapi
GetAdaptersAddresses
GetIpAddrTable
advapi32
ReportEventA
DeregisterEventSource
RegisterEventSourceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
kernel32
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFullPathNameW
FindClose
FindNextFileW
CreateMailslotA
GetLastError
Sleep
CreateFileW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetCurrentThreadId
GetLocalTime
WriteFile
ReadFile
GetProcAddress
GetSystemTime
SystemTimeToFileTime
GetSystemTimeAsFileTime
FileTimeToSystemTime
GetFileTime
GetDateFormatW
CompareStringW
GetTickCount
GetStringTypeW
OutputDebugStringW
GetTimeZoneInformation
LCMapStringW
SetEnvironmentVariableA
GetFileSize
GetCurrentDirectoryW
FindFirstFileW
HeapFree
GetStdHandle
GetFileType
GetModuleHandleA
FlushConsoleInputBuffer
MultiByteToWideChar
QueryPerformanceCounter
GetCurrentProcessId
FreeLibrary
GlobalMemoryStatus
LoadLibraryA
SetLastError
IsDebuggerPresent
IsProcessorFeaturePresent
GetFileAttributesExW
DeleteFileW
HeapAlloc
HeapReAlloc
MoveFileExW
EncodePointer
DecodePointer
GetConsoleMode
ReadConsoleW
WideCharToMultiByte
GetConsoleCP
GetModuleHandleW
CreateDirectoryW
CreateThread
ExitThread
ResumeThread
GetCommandLineA
RaiseException
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
EnterCriticalSection
LeaveCriticalSection
SetConsoleCtrlHandler
ReadConsoleInputA
SetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcessHeap
GetModuleFileNameW
HeapSize
SetStdHandle
DeleteCriticalSection
SetFilePointerEx
WriteConsoleW
SetEndOfFile
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
FlushFileBuffers
user32
PostThreadMessageW
GetMessageW
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
Sections
.text Size: 989KB - Virtual size: 988KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ