E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb
Behavioral task
behavioral1
Sample
2024-05-24_bd5c574422b0976371e1b5408c7c8137_stop.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-24_bd5c574422b0976371e1b5408c7c8137_stop.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_bd5c574422b0976371e1b5408c7c8137_stop
-
Size
1.1MB
-
MD5
bd5c574422b0976371e1b5408c7c8137
-
SHA1
68dea12c302daf2b8381f7d43c4a67af92669417
-
SHA256
8dca202b3a6b38fc8d57f252f3d4395e2d46cd2579aab8c75149b791a0b29250
-
SHA512
ea74f20bc08a1edbca280984b9e90804181da3221a83c8dbef3553af0ca834b1da39697a41710ac642ac47c67d83a5963c90b021c13c396e7887d1dad2931fbc
-
SSDEEP
24576:ZBUIKn/vwOXGUXAjCymYZiVtElVIBT2roqnTSSxWeT/XRPOO8TaHUq7:F0dwAYZt6C31WeTPRPOhT+Uq7
Malware Config
Signatures
-
Detected Djvu ransomware 1 IoCs
resource yara_rule sample family_djvu -
Djvu family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_bd5c574422b0976371e1b5408c7c8137_stop
Files
-
2024-05-24_bd5c574422b0976371e1b5408c7c8137_stop.exe windows:5 windows x86 arch:x86
0c756c849bc7b459f78f7a5ce46cd4a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcStringFreeW
UuidCreate
UuidToStringW
RpcStringFreeA
UuidToStringA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
HttpQueryInfoW
InternetOpenA
InternetOpenUrlA
winmm
timeGetTime
shlwapi
PathAppendA
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsA
PathFileExistsW
PathAppendW
PathFindExtensionW
kernel32
VirtualFree
WriteFile
GetDriveTypeA
OpenProcess
GlobalAlloc
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
Sleep
CopyFileW
FormatMessageW
lstrcpynW
CreateProcessA
TerminateProcess
ReadFile
CreateFileW
lstrcatA
GetEnvironmentVariableA
lstrcmpW
MultiByteToWideChar
lstrlenW
FlushFileBuffers
GetShortPathNameA
GetFileSizeEx
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
MoveFileW
FindClose
Process32FirstW
LocalAlloc
CreateEventW
GetModuleFileNameA
Process32NextW
lstrcatW
CreateMutexA
FindNextFileW
CreateToolhelp32Snapshot
SetEnvironmentVariableA
DeleteFileW
LocalFree
lstrcpyW
DeleteFileA
lstrcpyA
SetPriorityClass
GetCurrentProcess
GetComputerNameW
GetLogicalDrives
GetModuleFileNameW
SetStdHandle
GetVersion
CreateDirectoryA
CreateThread
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
CreateSemaphoreW
GetModuleHandleW
GetTickCount
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleA
GetVersionExA
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
WaitForSingleObject
CreateDirectoryW
SetFilePointerEx
CreateProcessW
FreeLibrary
SetErrorMode
lstrlenA
SetFilePointer
FindFirstFileW
SetConsoleMode
CreateFileA
GetCommandLineW
GetNumberOfConsoleInputEvents
PeekConsoleInputA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
RaiseException
GetStringTypeW
GetConsoleCP
ReadConsoleW
GetConsoleMode
HeapSize
LoadLibraryExW
OutputDebugStringW
SetConsoleCtrlHandler
RtlUnwind
FatalAppExitA
GetStartupInfoW
GetExitCodeProcess
LCMapStringW
DeleteCriticalSection
AreFileApisANSI
ExitProcess
GetProcessHeap
HeapReAlloc
GlobalFree
SetEndOfFile
ReadConsoleInputA
CloseHandle
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
user32
PeekMessageW
PostThreadMessageW
DefWindowProcW
DispatchMessageW
UpdateWindow
CreateWindowExW
LoadCursorW
IsWindow
ShowWindow
RegisterClassExW
PostQuitMessage
GetMessageW
DestroyWindow
SendMessageW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
GetDesktopWindow
MessageBoxW
TranslateMessage
advapi32
RegCloseKey
CloseServiceHandle
GetUserNameW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
CryptHashData
RegSetValueExW
CryptDestroyHash
ControlService
RegOpenKeyExW
CryptCreateHash
CryptEncrypt
CryptImportKey
QueryServiceStatus
RegQueryValueExW
CryptReleaseContext
OpenServiceW
OpenSCManagerW
CryptAcquireContextW
CryptGetHashParam
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteA
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathA
ole32
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
GetErrorInfo
CreateErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
iphlpapi
GetAdaptersInfo
ws2_32
inet_ntoa
inet_addr
gethostbyname
dnsapi
DnsFree
DnsQuery_W
crypt32
CryptStringToBinaryA
gdi32
DeleteObject
GetObjectA
SelectObject
GetDeviceCaps
GetBitmapBits
BitBlt
DeleteDC
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
Sections
.text Size: 809KB - Virtual size: 809KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ