Static task
static1
Behavioral task
behavioral1
Sample
2024-08-14_d2747c755b65c869c73b1ae952d6f44f_ransomlock.exe
Resource
win7-20240708-en
General
-
Target
2024-08-14_d2747c755b65c869c73b1ae952d6f44f_ransomlock
-
Size
32KB
-
MD5
d2747c755b65c869c73b1ae952d6f44f
-
SHA1
e0eba8a2a511303d917f1adc20c1ced387b99469
-
SHA256
7f1af5fe2372782a6f89f9eb19c352ccb969361d152a1634ab8034b7851d9095
-
SHA512
b59e8fd4c325bc76ce746e50042f81ec5e670a7b0f0859df528b1951a4b390b7233acdaa353c85b59d055dc9b9e97a1aea3a7625fed548b4c17464578aa97bb9
-
SSDEEP
384:8LipZl447piqb/lUYf5uH3w59AMRG5qUIjFgOrjFymqAeO8W8vU:dmiiqTfk2AMRGwlFgOrjspU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-14_d2747c755b65c869c73b1ae952d6f44f_ransomlock
Files
-
2024-08-14_d2747c755b65c869c73b1ae952d6f44f_ransomlock.exe windows:4 windows x86 arch:x86
9baada7990976866a91d4489334d7fe5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord661
ord557
ord666
ord593
ord594
ord595
ord596
ord709
ord632
ord526
EVENT_SINK_AddRef
ord561
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord606
ord608
ord716
ord570
ord100
ord610
ord616
ord617
ord540
ord619
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ