??0PlatformMethods@angle@@QEAA@XZ
??4PlatformMethods@angle@@QEAAAEAU01@$$QEAU01@@Z
??4PlatformMethods@angle@@QEAAAEAU01@AEBU01@@Z
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
ransomware file legit.exe
Resource
win10v2004-20240426-en
Target
ransomware_folder_trust_me.zip
Size
15.3MB
MD5
592299dc6cfb52d5cdd505ac15a821e2
SHA1
ca75a4b29937a356c60f55c78c433e4f90c89639
SHA256
1e0555ead0d226cc754d265e49001a36edbc19ea1147a01bf00e18a0cc2b9cf8
SHA512
84230577d786520c54c231316c0fde8397ba9a653cddd6d0055633090aa5b0f0cb5780ffbf86a592be691b6cd41963452c64092c265ac804cd96cbe2af89b790
SSDEEP
393216:Q730UOhu2oqxMJPeFJ8+VlqqmmzP0rCk+6/3HbksQcbxuVgWPo:MPOwAxMJiSmj9uLksTGQ
Checks for missing Authenticode signature.
resource |
---|
unpack001/ransomware file legit.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
midiInStop
midiInStart
midiInClose
midiInOpen
midiInGetErrorTextA
midiInGetDevCapsA
timeEndPeriod
midiInGetNumDevs
midiInGetID
timeBeginPeriod
GetCurrentThreadId
SetThreadPriority
SetPriorityClass
LoadLibraryW
GlobalSize
GlobalUnlock
GlobalLock
PowerCreateRequest
PowerSetRequest
PowerClearRequest
CompareStringOrdinal
LCIDToLocaleName
GetLocaleInfoEx
LoadLibraryA
GetLocaleInfoW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetTempFileNameA
GetTempPathA
HeapSize
GetFullPathNameW
HeapReAlloc
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
HeapAlloc
GetCommandLineA
ExitProcess
WriteFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
MoveFileExW
RemoveDirectoryW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetFileType
SetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
RtlUnwindEx
RaiseException
InterlockedPushEntrySList
RtlPcToFileHeader
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetCurrentThread
GetModuleHandleW
LCMapStringEx
DecodePointer
EncodePointer
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
AcquireSRWLockShared
ReleaseSRWLockShared
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
GetNativeSystemInfo
GetTimeZoneInformation
SystemTimeToFileTime
FormatMessageW
LoadLibraryExW
GetProcAddress
GetModuleHandleA
GetModuleFileNameW
FreeLibrary
GetLocalTime
GetSystemTimeAsFileTime
GetSystemTime
OpenProcess
CreateProcessW
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
Sleep
WaitForSingleObject
QueryPerformanceFrequency
QueryPerformanceCounter
SetLastError
GetExitCodeThread
SwitchToThread
WaitForSingleObjectEx
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsValidCodePage
CreatePipe
GetLastError
SetHandleInformation
CloseHandle
ReadFile
SetFileAttributesW
FindFirstFileW
OutputDebugStringA
K32GetPerformanceInfo
SetConsoleCtrlHandler
ReadConsoleW
SetConsoleMode
AttachConsole
GetUserDefaultUILanguage
FindClose
CompareFileTime
SetEnvironmentVariableW
GetEnvironmentVariableW
GetStdHandle
WideCharToMultiByte
LocalFree
GlobalAlloc
GetCommandLineW
VerifyVersionInfoW
VerSetConditionMask
GetStringTypeW
GetModuleHandleExA
ReplaceFileW
MultiByteToWideChar
WriteConsoleW
SetEndOfFile
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExA
GetFileAttributesW
GetLogicalDrives
GetTempFileNameW
GetVolumeInformationW
CoInitializeEx
CoUninitialize
CoCreateInstance
PropVariantClear
CoTaskMemFree
VariantInit
SysFreeString
SysAllocString
RegisterRawInputDevices
GetRawInputData
EnumDisplayMonitors
GetMonitorInfoW
GetMonitorInfoA
MonitorFromWindow
SystemParametersInfoA
EnumDisplaySettingsW
CreateIconIndirect
CreateIconFromResource
DestroyIcon
LoadIconA
LoadCursorA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SetWindowLongPtrA
GetWindowLongPtrA
OffsetRect
FillRect
ClipCursor
WindowFromPoint
ScreenToClient
ClientToScreen
SetCaretPos
DestroyCaret
CreateCaret
GetCursorPos
SetCursor
SetCursorPos
AdjustWindowRectEx
GetWindowRect
GetClientRect
SetWindowTextW
SetWindowRgn
GetUpdateRect
ReleaseDC
GetWindowDC
GetDCEx
GetRawInputDeviceInfoA
AllowSetForegroundWindow
SetForegroundWindow
GetForegroundWindow
GetSystemMetrics
KillTimer
SetTimer
ReleaseCapture
SetCapture
MapVirtualKeyExA
MapVirtualKeyA
RegisterTouchWindow
CloseTouchInputHandle
GetTouchInputInfo
GetKeyState
SetFocus
IsClipboardFormatAvailable
EmptyClipboard
RegisterClipboardFormatA
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
MoveWindow
FlashWindowEx
ShowWindow
DestroyWindow
IsWindow
CreateWindowExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
SendMessageW
SendMessageA
GetMessageExtraInfo
PeekMessageW
DispatchMessageW
TranslateMessage
TrackMouseEvent
GetKeyboardLayout
GetKeyboardLayoutList
ToUnicodeEx
ActivateKeyboardLayout
MessageBoxW
GetRawInputDeviceList
RegisterClassW
UnregisterClassW
GetWindowThreadProcessId
GetDC
WindowFromDC
SwapBuffers
SetPixelFormat
ChoosePixelFormat
CreatePolygonRgn
CreateDIBSection
SelectObject
Rectangle
GetTextExtentPoint32W
GetStockObject
GetPixel
GetDIBits
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
BitBlt
DragQueryFileW
ShellExecuteW
CommandLineToArgvW
DragAcceptFiles
SHCreateItemFromParsingName
SHFileOperationW
SHGetKnownFolderPath
GetCurrentHwProfileA
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
DirectInput8Create
ImmGetContext
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmGetCompositionStringW
ImmAssociateContext
ImmReleaseContext
BCryptGenRandom
CertGetCertificateContextProperty
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreA
CryptBinaryToStringA
AvSetMmThreadCharacteristicsW
AvSetMmThreadPriority
DwmGetWindowAttribute
DwmEnableBlurBehindWindow
DwmSetWindowAttribute
DWriteCreateFactory
GetAdaptersAddresses
htons
listen
ntohs
recv
recvfrom
select
getsockname
sendto
setsockopt
socket
__WSAFDIsSet
WSACleanup
WSAGetLastError
inet_ntoa
closesocket
accept
bind
send
WSAStartup
getaddrinfo
WSAConnect
freeaddrinfo
NtQueryInformationFile
CreateDXGIFactory1
??0PlatformMethods@angle@@QEAA@XZ
??4PlatformMethods@angle@@QEAAAEAU01@$$QEAU01@@Z
??4PlatformMethods@angle@@QEAAAEAU01@AEBU01@@Z
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ