F:\svn\local\迅推\Hijack\Release\InstallSPI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_1daff40b786813d86afd183ea3991a3a_bkransomware_karagany.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-02_1daff40b786813d86afd183ea3991a3a_bkransomware_karagany.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_1daff40b786813d86afd183ea3991a3a_bkransomware_karagany
-
Size
287KB
-
MD5
1daff40b786813d86afd183ea3991a3a
-
SHA1
2bd9685f664c6b8d84cfb43f86eb52019b62fd22
-
SHA256
da361dce519aa9a69fb12846af7f8f4cc05a89fee6670d3beb7d4b427db9b2e4
-
SHA512
2a8c12a0950777ad71a45d790d40e3a853c1200227c18441f8a0fdac245288ac05d534ed2747255a85308dad5c1d4185538a4fd7a11bba53b7bb47148be519fb
-
SSDEEP
3072:cuUtavEuHAUxsajbRLSElgQfdKPiWcLpNJSPX9swqjVhK9Yn/MKENycKAydfwBc+:s+TAU39rHcP2rBnBnskcKJ50
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-02_1daff40b786813d86afd183ea3991a3a_bkransomware_karagany
Files
-
2024-09-02_1daff40b786813d86afd183ea3991a3a_bkransomware_karagany.exe windows:5 windows x86 arch:x86
f5e6bf1984e1a8a286c97bff6465c9e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatW
CreateFileW
DeviceIoControl
GetSystemInfo
GetVersionExW
FreeResource
WriteFile
GetTempPathW
GetPrivateProfileStringW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GlobalFree
GlobalAlloc
OutputDebugStringW
LoadLibraryW
GetCurrentThreadId
Sleep
CreateEventW
SetEvent
WaitForSingleObject
ResetEvent
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
WriteConsoleW
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
lstrcpyW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
CloseHandle
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
WideCharToMultiByte
TlsGetValue
TlsAlloc
FlushFileBuffers
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCommandLineW
LoadLibraryExW
ExitThread
CreateThread
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
EncodePointer
LeaveCriticalSection
EnterCriticalSection
IsDebuggerPresent
GetLastError
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DestroyWindow
DefWindowProcW
LoadCursorW
TranslateMessage
GetDesktopWindow
GetClassNameW
GetForegroundWindow
FindWindowExW
RegisterWindowMessageW
BeginPaint
DispatchMessageW
wsprintfW
GetWindow
GetSystemMetrics
TranslateAcceleratorW
GetMessageW
PostQuitMessage
SendMessageTimeoutW
SendMessageW
LoadAcceleratorsW
EndPaint
LoadStringW
advapi32
RegOpenKeyW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
ole32
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
PathRemoveFileSpecW
ws2_32
WSCDeinstallProvider
WSCEnumProtocols
WSCInstallProvider
WSCWriteProviderOrder
wininet
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetQueryOptionW
InternetSetOptionW
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
iphlpapi
GetAdaptersInfo
rpcrt4
UuidCreate
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ