Static task
static1
Behavioral task
behavioral1
Sample
OppiRansom.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
OppiRansom.exe
Resource
win10v2004-20240704-en
General
-
Target
OppiRansom.exe
-
Size
6.0MB
-
MD5
6c538c5ec11daa5b9e2d4da8c68afcaf
-
SHA1
3fad02f4f28d2fd289305bcd383f3a066b67eef9
-
SHA256
6baab0fc6bf8096e11a2f6fa41fe4870565603263882fb4751371ef5586d316c
-
SHA512
c63a92b5390da18789c17a12cc6b2b305fa4f3c5d048c974a6bdc6947df12944a5ce6681c3e2928f8621707013f8e03b02907684e35d82428e431ee7579bddeb
-
SSDEEP
49152:M+5ZK4vCcfv4ye0W+WqwppppppjpybVJMopAW1e4CX7cxWsSWfQG77QCHVx7VvKU:hPKKCcoaDnP1e4CX7hsSWfQGYJt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource OppiRansom.exe
Files
-
OppiRansom.exe.exe windows:6 windows x64 arch:x64
4d8f9f11d082ddb46b8f0d8975da071c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLocalTime
VirtualAlloc
VirtualProtect
VirtualFree
Sleep
CreateThread
GetModuleHandleW
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
WriteFile
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CloseHandle
ReadFile
GetFileSizeEx
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
SetUnhandledExceptionFilter
CreateFileA
RtlCaptureContext
user32
GetWindowTextW
GetWindowRect
FillRect
GetWindowLongPtrW
GetDesktopWindow
LoadBitmapW
LoadCursorW
LoadIconW
GetMonitorInfoW
EnumDisplayMonitors
GetWindowTextLengthW
SetWindowTextW
SetWindowTextA
EndPaint
BeginPaint
ReleaseDC
GetDC
UpdateWindow
TranslateAcceleratorW
LoadAcceleratorsW
KillTimer
SetTimer
GetFocus
LoadStringW
ShowWindow
CreateWindowExW
RegisterClassExW
GetMessageW
TranslateMessage
DispatchMessageW
SendMessageW
DefWindowProcW
PostQuitMessage
GetClientRect
gdi32
BitBlt
CreateFontW
CreateSolidBrush
DeleteDC
DeleteObject
SelectObject
GetObjectW
CreateCompatibleDC
bcrypt
BCryptGenRandom
BCryptEncrypt
BCryptCloseAlgorithmProvider
BCryptSetProperty
BCryptOpenAlgorithmProvider
BCryptGenerateSymmetricKey
vcruntime140
__C_specific_handler
strstr
memcpy
__current_exception
__current_exception_context
memset
api-ms-win-crt-string-l1-1-0
strcat_s
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_cexit
_register_onexit_function
_crt_atexit
terminate
_seh_filter_exe
_set_app_type
exit
_initialize_wide_environment
_initialize_onexit_table
_exit
_configure_wide_argv
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vswprintf
__p__commode
__stdio_common_vsprintf
api-ms-win-crt-convert-l1-1-0
wcstoull
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ