Static task
static1
Behavioral task
behavioral1
Sample
202406144a7290d2a0f4ba6b8a9ea7251c8f5df9bkransomwaremetamorfo.exe
Resource
win7-20240220-en
General
-
Target
202406144a7290d2a0f4ba6b8a9ea7251c8f5df9bkransomwaremetamorfo.exe
-
Size
6.7MB
-
MD5
4a7290d2a0f4ba6b8a9ea7251c8f5df9
-
SHA1
72aa8a6582d9dc5d73955c94e9ea803d71fc466b
-
SHA256
f59166f10bb796132c696a661b5045d0642196e0a1f24b4eca08c9cdc7f70da0
-
SHA512
212c141016464a68be6be1a69766e1127e0f9b01debe1169aa73d31990417f797f7a70542ed58296dc3f186cd8c91fe0816de2fcf94e03106cafa72af06c85f8
-
SSDEEP
98304:9bmlAhiVbRm+xsQkFIZ0xSdDsut3UmBsfMu80kR82gM3kxVxI1xfCRM4neFxTyuh:UrpRm+GFCJIut3/uxOhaWbfC24neFr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 202406144a7290d2a0f4ba6b8a9ea7251c8f5df9bkransomwaremetamorfo.exe
Files
-
202406144a7290d2a0f4ba6b8a9ea7251c8f5df9bkransomwaremetamorfo.exe.exe windows:6 windows x86 arch:x86
6145dd3faece3f4aa0dd67c541ae1824
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetConsoleMode
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
Sleep
SuspendThread
IsDebuggerPresent
GetExitCodeThread
GetTempPathW
SetThreadPriority
ReadProcessMemory
SizeofResource
GetUserDefaultLCID
LoadResource
SetFilePointer
GetFileSize
WinExec
SwitchToThread
GetUserDefaultUILanguage
GetSystemInfo
VirtualAlloc
GetFileAttributesW
HeapDestroy
CreateDirectoryW
GetSystemDefaultUILanguage
ReleaseSemaphore
RtlCaptureContext
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapAlloc
CreateFileW
user32
GetMessageW
ShowWindow
CreateWindowExW
SendMessageW
UpdateWindow
SetCapture
ModifyMenuW
GetCapture
GetWindowTextW
SetScrollPos
SetWindowsHookExA
GetSysColor
CheckDlgButton
FlashWindow
SetDlgItemTextA
GetWindowTextLengthA
GetDlgItemInt
AttachThreadInput
MessageBeep
GetMenuItemInfoW
GetDoubleClickTime
GetDC
GetKeyboardState
GetMenu
SetPropA
SetRect
ReleaseDC
ScrollWindow
CharUpperW
GetDesktopWindow
GetSysColorBrush
CheckRadioButton
GetDlgItemTextW
SetDlgItemTextW
DialogBoxParamA
SetMenuItemInfoW
CheckMenuItem
TranslateMDISysAccel
SetCursor
gdi32
GetTextExtentPoint32A
SetPixel
DeleteObject
CreateBrushIndirect
SelectPalette
IntersectClipRect
RestoreDC
MaskBlt
DeleteDC
GetDIBits
CreateHalftonePalette
CreateBitmap
SelectObject
CreateCompatibleDC
SetMapMode
EndDoc
GetStockObject
UpdateColors
GetWindowOrgEx
advapi32
RegEnumKeyExW
AllocateAndInitializeSid
RegGetKeySecurity
OpenServiceW
OpenSCManagerW
RegQueryInfoKeyW
CopySid
RegUnLoadKeyW
shell32
ShellExecuteExW
CommandLineToArgvW
ExtractIconExW
SHGetFileInfoW
oleaut32
VariantCopy
Sections
.text Size: 690KB - Virtual size: 689KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ