F:\svn\local\迅推\Hijack\Release\InstallSPI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_8950dd2b913317926c44621932eb9170_bkransomware_karagany.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-06_8950dd2b913317926c44621932eb9170_bkransomware_karagany.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_8950dd2b913317926c44621932eb9170_bkransomware_karagany
-
Size
271KB
-
MD5
8950dd2b913317926c44621932eb9170
-
SHA1
a1376b6105767afadb2efad0af9d563c5ffc4951
-
SHA256
60bc78a008234ed169ec7f8b2d74cbccb119388f213f3860271a2e9f03c13ee2
-
SHA512
1b6ed11c96f7c5b7b3a9dd29c6b4f729947aadb20f3b41b6afb9f2e987c31f84c537dacf51fa40c1206abb1ad4ee229fe6b3a156e55c6704a24fd93239f36d29
-
SSDEEP
3072:cuUtavEuHAUxsajbRLSElgQfdKPiWcLpNJSPX9swqjVhK9Yn/MKENCG0GfZlt:s+TAU39rHcP2rBnBnsAG0GxP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-06_8950dd2b913317926c44621932eb9170_bkransomware_karagany
Files
-
2024-09-06_8950dd2b913317926c44621932eb9170_bkransomware_karagany.exe windows:5 windows x86 arch:x86
f5e6bf1984e1a8a286c97bff6465c9e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatW
CreateFileW
DeviceIoControl
GetSystemInfo
GetVersionExW
FreeResource
WriteFile
GetTempPathW
GetPrivateProfileStringW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GlobalFree
GlobalAlloc
OutputDebugStringW
LoadLibraryW
GetCurrentThreadId
Sleep
CreateEventW
SetEvent
WaitForSingleObject
ResetEvent
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
WriteConsoleW
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
lstrcpyW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
CloseHandle
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
WideCharToMultiByte
TlsGetValue
TlsAlloc
FlushFileBuffers
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCommandLineW
LoadLibraryExW
ExitThread
CreateThread
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
EncodePointer
LeaveCriticalSection
EnterCriticalSection
IsDebuggerPresent
GetLastError
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DestroyWindow
DefWindowProcW
LoadCursorW
TranslateMessage
GetDesktopWindow
GetClassNameW
GetForegroundWindow
FindWindowExW
RegisterWindowMessageW
BeginPaint
DispatchMessageW
wsprintfW
GetWindow
GetSystemMetrics
TranslateAcceleratorW
GetMessageW
PostQuitMessage
SendMessageTimeoutW
SendMessageW
LoadAcceleratorsW
EndPaint
LoadStringW
advapi32
RegOpenKeyW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
ole32
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
PathRemoveFileSpecW
ws2_32
WSCDeinstallProvider
WSCEnumProtocols
WSCInstallProvider
WSCWriteProviderOrder
wininet
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetQueryOptionW
InternetSetOptionW
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
iphlpapi
GetAdaptersInfo
rpcrt4
UuidCreate
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ