E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb
Behavioral task
behavioral1
Sample
2024-05-24_cf5cb6528b4d2bb5e30fab44d0ac53cd_stop.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-24_cf5cb6528b4d2bb5e30fab44d0ac53cd_stop.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_cf5cb6528b4d2bb5e30fab44d0ac53cd_stop
-
Size
1.1MB
-
MD5
cf5cb6528b4d2bb5e30fab44d0ac53cd
-
SHA1
7d7a3e33f29199114ba4337be57c42d84d8c6304
-
SHA256
399acff865348df3c641eb7e5837725ee47962b4ef99a9409ac362a3bcec64e3
-
SHA512
e163cacd86f61b27fe23cdc3e7531da846ed01c65bced0d3e14d8064d406e1ca23cd69ec4577c69c7789d7d62315a8af12aae6b1615b11e98171339c7a17e068
-
SSDEEP
24576:ZBUIKn/vwOXGUXAjCymYZiVtElVIBT2roqnTSSxWeT/XRPOO8sLHUq7:F0dwAYZt6C31WeTPRPOhsDUq7
Malware Config
Signatures
-
Detected Djvu ransomware 1 IoCs
resource yara_rule sample family_djvu -
Djvu family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_cf5cb6528b4d2bb5e30fab44d0ac53cd_stop
Files
-
2024-05-24_cf5cb6528b4d2bb5e30fab44d0ac53cd_stop.exe windows:5 windows x86 arch:x86
0c756c849bc7b459f78f7a5ce46cd4a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcStringFreeW
UuidCreate
UuidToStringW
RpcStringFreeA
UuidToStringA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
HttpQueryInfoW
InternetOpenA
InternetOpenUrlA
winmm
timeGetTime
shlwapi
PathAppendA
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsA
PathFileExistsW
PathAppendW
PathFindExtensionW
kernel32
VirtualFree
WriteFile
GetDriveTypeA
OpenProcess
GlobalAlloc
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
Sleep
CopyFileW
FormatMessageW
lstrcpynW
CreateProcessA
TerminateProcess
ReadFile
CreateFileW
lstrcatA
GetEnvironmentVariableA
lstrcmpW
MultiByteToWideChar
lstrlenW
FlushFileBuffers
GetShortPathNameA
GetFileSizeEx
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
MoveFileW
FindClose
Process32FirstW
LocalAlloc
CreateEventW
GetModuleFileNameA
Process32NextW
lstrcatW
CreateMutexA
FindNextFileW
CreateToolhelp32Snapshot
SetEnvironmentVariableA
DeleteFileW
LocalFree
lstrcpyW
DeleteFileA
lstrcpyA
SetPriorityClass
GetCurrentProcess
GetComputerNameW
GetLogicalDrives
GetModuleFileNameW
SetStdHandle
GetVersion
CreateDirectoryA
CreateThread
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
CreateSemaphoreW
GetModuleHandleW
GetTickCount
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleA
GetVersionExA
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
WaitForSingleObject
CreateDirectoryW
SetFilePointerEx
CreateProcessW
FreeLibrary
SetErrorMode
lstrlenA
SetFilePointer
FindFirstFileW
SetConsoleMode
CreateFileA
GetCommandLineW
GetNumberOfConsoleInputEvents
PeekConsoleInputA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
RaiseException
GetStringTypeW
GetConsoleCP
ReadConsoleW
GetConsoleMode
HeapSize
LoadLibraryExW
OutputDebugStringW
SetConsoleCtrlHandler
RtlUnwind
FatalAppExitA
GetStartupInfoW
GetExitCodeProcess
LCMapStringW
DeleteCriticalSection
AreFileApisANSI
ExitProcess
GetProcessHeap
HeapReAlloc
GlobalFree
SetEndOfFile
ReadConsoleInputA
CloseHandle
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
user32
PeekMessageW
PostThreadMessageW
DefWindowProcW
DispatchMessageW
UpdateWindow
CreateWindowExW
LoadCursorW
IsWindow
ShowWindow
RegisterClassExW
PostQuitMessage
GetMessageW
DestroyWindow
SendMessageW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
GetDesktopWindow
MessageBoxW
TranslateMessage
advapi32
RegCloseKey
CloseServiceHandle
GetUserNameW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
CryptHashData
RegSetValueExW
CryptDestroyHash
ControlService
RegOpenKeyExW
CryptCreateHash
CryptEncrypt
CryptImportKey
QueryServiceStatus
RegQueryValueExW
CryptReleaseContext
OpenServiceW
OpenSCManagerW
CryptAcquireContextW
CryptGetHashParam
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteA
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathA
ole32
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
GetErrorInfo
CreateErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
iphlpapi
GetAdaptersInfo
ws2_32
inet_ntoa
inet_addr
gethostbyname
dnsapi
DnsFree
DnsQuery_W
crypt32
CryptStringToBinaryA
gdi32
DeleteObject
GetObjectA
SelectObject
GetDeviceCaps
GetBitmapBits
BitBlt
DeleteDC
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
Sections
.text Size: 809KB - Virtual size: 809KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ