Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_340ed69101196559e2e0ae549986ac7c_bkransomware_ramnit.exe
Resource
win7-20240903-en
General
-
Target
2024-09-07_340ed69101196559e2e0ae549986ac7c_bkransomware_ramnit
-
Size
430KB
-
MD5
340ed69101196559e2e0ae549986ac7c
-
SHA1
f4b000887c88db8e5949134ecae45d9c8a655f0b
-
SHA256
9420b32ea074b254daad760348717303318470f21a621135ff82eb57643088f0
-
SHA512
d49c2b8cb05c458ecd47c613aef1ff25e4fb1bdeb61e9144adf3f46cbc26550b0cf0f0d8b983fb7ed696cf99ed3e720612e194da84665ad9e476f99a59b3edef
-
SSDEEP
6144:zrGLrVLVXrTSLWlQYTeQU8CMBbQse7SSsacaod7k5Vw9bCpiEcTMZ+Or8mbXa:XmXiLz/6QsorBK45VBp+fOr8Ia
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_340ed69101196559e2e0ae549986ac7c_bkransomware_ramnit
Files
-
2024-09-07_340ed69101196559e2e0ae549986ac7c_bkransomware_ramnit.exe windows:5 windows x86 arch:x86
c3ec588feb194caec7c67f7cc00e9773
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
LoadLibraryW
ReadProcessMemory
GetFileAttributesA
GetFileAttributesW
CreateProcessA
TerminateProcess
ReadFile
GetModuleFileNameW
FindFirstFileA
GetLastError
SetLastError
GetProcAddress
VirtualProtectEx
FindClose
GetPrivateProfileStringA
LoadLibraryA
WritePrivateProfileStringA
FindNextFileA
GetModuleHandleA
GetModuleHandleW
OutputDebugStringA
CloseHandle
GetVersion
WriteProcessMemory
ResumeThread
DeleteFileA
FlushFileBuffers
HeapSize
WriteConsoleW
SetStdHandle
HeapReAlloc
OutputDebugStringW
RtlUnwind
LoadLibraryExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
FreeLibrary
SetFilePointer
GetCurrentDirectoryA
CreateFileA
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
EncodePointer
DecodePointer
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
MultiByteToWideChar
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
HeapAlloc
RaiseException
ExitProcess
GetModuleHandleExW
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameA
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
CreateFileW
user32
LoadIconA
SendMessageA
GetDlgItem
EndDialog
ShowWindow
SetWindowTextA
SendMessageW
EnableWindow
DialogBoxParamA
SetWindowTextW
DestroyIcon
DefWindowProcA
gdi32
CreateFontIndirectA
GetObjectA
SetTextColor
shell32
ShellExecuteW
ShellExecuteExA
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE