Static task
static1
Behavioral task
behavioral1
Sample
20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
20240819a042363697a1223f9e939f0d45af42dbbkransomware
-
Size
6.7MB
-
MD5
a042363697a1223f9e939f0d45af42db
-
SHA1
f3ad51b38082225ff2b2c7de7afde74c98bff442
-
SHA256
0a88441599708e6db61bb9d31e8701ac08b17a69f1d46361385f700b090718f4
-
SHA512
656fe7f529fe5b3dec510194c17fe687afc8b880341e917ef5f19533d721b03175dcbcea69703a343bcc5869af6329a2686d473f94d5e3189b36fb0d0bfcb900
-
SSDEEP
98304:XNnN9K9kEk9khQzw+1mAMw5svqBNtb7yCJCva2JTV40IOMy:X79V9jzw+1mAMw6vqRb7yuixrIU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20240819a042363697a1223f9e939f0d45af42dbbkransomware
Files
-
20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe windows:6 windows x86 arch:x86
3924f30f392c6102a97d897ec3c2782a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetOEMCP
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
LoadLibraryW
SetStdHandle
LoadLibraryA
GetLocalTime
IsValidCodePage
IsDBCSLeadByteEx
GlobalUnlock
GetACP
GetTimeZoneInformation
MulDiv
Sleep
IsValidLocale
WideCharToMultiByte
GetSystemTimeAsFileTime
SetHandleInformation
GetCurrentProcess
GetCommState
GetEnvironmentVariableW
VirtualQuery
GetCPInfo
ExitProcess
FindClose
CreateThread
ExpandEnvironmentStringsW
DeleteFileA
GetSystemTime
LocalFree
CloseHandle
FindNextFileW
CreatePipe
CreateFileMappingA
ResetEvent
SetLastError
RaiseException
GetStartupInfoW
CreateFileW
CreateProcessA
GetFileAttributesA
CreateEventA
InitializeCriticalSectionAndSpinCount
TlsSetValue
SetCommTimeouts
GetWindowsDirectoryA
ExpandEnvironmentStringsA
GetModuleHandleExW
GetEnvironmentStringsW
SetEnvironmentVariableW
InitializeSListHead
SetEndOfFile
TlsGetValue
CreateFileA
FreeEnvironmentStringsW
HeapFree
LoadLibraryExW
ExitThread
DuplicateHandle
WaitForSingleObject
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateEventW
TerminateProcess
TlsAlloc
TlsFree
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
WriteConsoleW
user32
RegisterClassA
EndPaint
SetCursor
SetTimer
HideCaret
MapDialogRect
GetMessageW
IsIconic
SetKeyboardState
DrawIconEx
DeleteMenu
MessageBeep
ShowCaret
BeginPaint
EnumWindows
GetKeyboardState
GetScrollInfo
MessageBoxA
UnionRect
UnregisterClassA
SetScrollPos
SetClassLongA
ScrollWindow
ShowWindow
SetMenu
IsDlgButtonChecked
DrawMenuBar
AppendMenuA
CreateWindowExW
CheckRadioButton
GetSystemMetrics
SendMessageW
UpdateWindow
EnableWindow
EndMenu
GetDlgItemTextA
DrawFrameControl
SetScrollInfo
CopyRect
ClientToScreen
DestroyWindow
DestroyAcceleratorTable
KillTimer
IsZoomed
LoadStringA
GetDC
GetWindowPlacement
OffsetRect
SetRect
ReleaseDC
DestroyCursor
GetDesktopWindow
CreatePopupMenu
PostMessageA
RemoveMenu
SystemParametersInfoA
ReleaseCapture
RegisterClassW
SetCaretPos
SetWindowTextA
LoadCursorA
DestroyIcon
SetDlgItemTextA
gdi32
MoveToEx
PolyPolygon
SetViewportOrgEx
DeleteDC
StretchBlt
GetDIBits
SetBkColor
GdiFlush
SelectClipRgn
PlayEnhMetaFile
RectInRegion
Ellipse
ExtCreateRegion
SaveDC
RealizePalette
SetPolyFillMode
GetCharABCWidthsW
SetStretchBltMode
GetSystemPaletteEntries
CreatePatternBrush
GetPixel
ExtTextOutA
CreateEnhMetaFileW
EndPage
SetLayout
Arc
MaskBlt
CopyEnhMetaFileA
GetEnhMetaFileHeader
SetPixel
GetRegionData
GetPaletteEntries
PtInRegion
CreatePenIndirect
CreateRectRgnIndirect
GetBkColor
GetDIBColorTable
GetTextExtentExPointA
GetCharWidth32A
GetClipBox
SetROP2
CreateDIBitmap
GetStockObject
SetWinMetaFileBits
CloseEnhMetaFile
SetDIBColorTable
advapi32
GetLengthSid
RegOpenKeyExA
LookupPrivilegeValueW
RegDeleteKeyA
GetUserNameA
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 715KB - Virtual size: 714KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DoQ Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ