F:\svn\local\迅推\Hijack\Release\InstallSPI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_0760266e60f0db17c53ff49a9b500761_bkransomware_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-08_0760266e60f0db17c53ff49a9b500761_bkransomware_karagany.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_0760266e60f0db17c53ff49a9b500761_bkransomware_karagany
-
Size
291KB
-
MD5
0760266e60f0db17c53ff49a9b500761
-
SHA1
ed16a2dddc5bbf54e1f479b21ffb663e804408de
-
SHA256
6b323e637c592246f5874b879f473c3cb0c2e0b1c23bf8437daefe1166a0cbb3
-
SHA512
d9d9176a6ec08a2e7fd5127404076cbb93ec5d0adb823c023d343d4e5c63a89d31196670a988b8cf931b60fbdcd53deeeb589d9185157f75fe7c210c8811580d
-
SSDEEP
3072:cuUtavEuHAUxsajbRLSElgQfdKPiWcLpNJSPX9swqjVhK9Yn/MKENjUFS9eu9c:s+TAU39rHcP2rBnBnsKCeu+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_0760266e60f0db17c53ff49a9b500761_bkransomware_karagany
Files
-
2024-09-08_0760266e60f0db17c53ff49a9b500761_bkransomware_karagany.exe windows:5 windows x86 arch:x86
f5e6bf1984e1a8a286c97bff6465c9e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatW
CreateFileW
DeviceIoControl
GetSystemInfo
GetVersionExW
FreeResource
WriteFile
GetTempPathW
GetPrivateProfileStringW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GlobalFree
GlobalAlloc
OutputDebugStringW
LoadLibraryW
GetCurrentThreadId
Sleep
CreateEventW
SetEvent
WaitForSingleObject
ResetEvent
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
WriteConsoleW
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
lstrcpyW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
CloseHandle
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
WideCharToMultiByte
TlsGetValue
TlsAlloc
FlushFileBuffers
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCommandLineW
LoadLibraryExW
ExitThread
CreateThread
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
EncodePointer
LeaveCriticalSection
EnterCriticalSection
IsDebuggerPresent
GetLastError
user32
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DestroyWindow
DefWindowProcW
LoadCursorW
TranslateMessage
GetDesktopWindow
GetClassNameW
GetForegroundWindow
FindWindowExW
RegisterWindowMessageW
BeginPaint
DispatchMessageW
wsprintfW
GetWindow
GetSystemMetrics
TranslateAcceleratorW
GetMessageW
PostQuitMessage
SendMessageTimeoutW
SendMessageW
LoadAcceleratorsW
EndPaint
LoadStringW
advapi32
RegOpenKeyW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
ole32
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
PathRemoveFileSpecW
ws2_32
WSCDeinstallProvider
WSCEnumProtocols
WSCInstallProvider
WSCWriteProviderOrder
wininet
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetQueryOptionW
InternetSetOptionW
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
iphlpapi
GetAdaptersInfo
rpcrt4
UuidCreate
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ