Static task
static1
Behavioral task
behavioral1
Sample
20240909e2439b0923b62518dfbbe8ff4ef7ad31bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240909e2439b0923b62518dfbbe8ff4ef7ad31bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
20240909e2439b0923b62518dfbbe8ff4ef7ad31bkransomware
-
Size
6.7MB
-
MD5
e2439b0923b62518dfbbe8ff4ef7ad31
-
SHA1
a3387aff5cb0ae02127f2b8addfcefb53551dc71
-
SHA256
b3d376e96950254df9f4d1796f7e6647a2016396b69fec8a022eb46e68cef5ba
-
SHA512
0182b76f643f246ea1ab9823ec0e0148adc94eece2d7a52615fd4f5def5f93997e4e5a0f1968b47764432db7f42b71ea832bd9cd7ccbc8d4d76e12bab48f6d13
-
SSDEEP
196608:BK7e4o7rHVdGWPaW2HWdYJ+urCIPeL7uZhpnwMXL:khUrHvput3w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20240909e2439b0923b62518dfbbe8ff4ef7ad31bkransomware
Files
-
20240909e2439b0923b62518dfbbe8ff4ef7ad31bkransomware.exe windows:6 windows x86 arch:x86
c7d43cf42a61d2b3b66b6c029b254acf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
RtlCaptureContext
MapViewOfFile
UnmapViewOfFile
GetDriveTypeW
GetSystemDefaultUILanguage
FindResourceW
FreeLibrary
WaitNamedPipeA
InitializeSListHead
CreateDirectoryW
GlobalLock
SignalObjectAndWait
SetCommBreak
WaitForSingleObjectEx
GetCurrentThread
VirtualFree
GetSystemTimeAsFileTime
GetWindowsDirectoryA
GetProcessTimes
WideCharToMultiByte
LoadLibraryW
IsValidLocale
InitializeCriticalSectionAndSpinCount
Sleep
CreateEventA
FormatMessageW
FileTimeToSystemTime
SetThreadPriority
GetStartupInfoW
GlobalUnlock
GetPrivateProfileIntW
FindFirstFileA
SetLastError
IsValidCodePage
FindClose
ResetEvent
GetExitCodeThread
CreateEventW
DeviceIoControl
EnumResourceTypesW
GetThreadPriority
GetModuleHandleA
FileTimeToLocalFileTime
DeleteFileW
OpenFileMappingA
LocalFree
EnumResourceNamesW
ExpandEnvironmentStringsW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
EncodePointer
GetFullPathNameW
ExitProcess
ResumeThread
TlsFree
VirtualProtect
FindNextFileA
CreatePipe
GetSystemInfo
QueryDosDeviceW
LockResource
CreateFileMappingA
GetLocalTime
GlobalFree
EnterCriticalSection
CreateNamedPipeA
GetCPInfoExW
GetTempPathW
ExitThread
GetOverlappedResult
MulDiv
GetExitCodeProcess
LeaveCriticalSection
GetSystemTimeAdjustment
GetSystemDirectoryW
OpenProcess
SetCommTimeouts
GetUserDefaultLCID
SetHandleInformation
HeapFree
SetEnvironmentVariableW
VerSetConditionMask
LoadLibraryExW
SetErrorMode
GetLocaleInfoA
CreateFileA
GetTempFileNameW
GetEnvironmentVariableW
SuspendThread
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SwitchToThread
SetEvent
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThreadId
DeleteCriticalSection
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
CreateTimerQueue
CreateFileW
user32
BeginDeferWindowPos
GetDlgItemInt
DestroyAcceleratorTable
GetMessageW
RegisterWindowMessageW
AttachThreadInput
EnumWindows
CreateIconIndirect
DrawFocusRect
InflateRect
GetMenu
CheckMenuRadioItem
MessageBoxA
DrawStateW
SetWindowLongW
DestroyCursor
GetDlgCtrlID
GetSysColorBrush
CreateWindowExW
ShowWindow
SetDlgItemTextW
ValidateRgn
SendMessageW
UpdateWindow
EndMenu
ToUnicode
DrawFrameControl
GetMonitorInfoW
CheckMenuItem
CopyRect
GetWindow
EndPaint
CharNextW
PostMessageW
GetKeyState
GetDC
CreateDialogIndirectParamA
SetDlgItemInt
GetWindowTextW
CharUpperW
GetDesktopWindow
EnumChildWindows
InsertMenuW
gdi32
SetWindowOrgEx
SetLayout
SetViewportOrgEx
PlayEnhMetaFile
RectInRegion
Ellipse
ExtCreateRegion
GetBkColor
GetObjectW
GetCharABCWidthsW
SetStretchBltMode
GetTextExtentPoint32W
SetTextColor
CreateHatchBrush
StretchBlt
GetRgnBox
GetEnhMetaFileHeader
GetRegionData
CreatePatternBrush
SetWinMetaFileBits
GetTextExtentPointW
comdlg32
FindTextW
GetSaveFileNameW
advapi32
RegCloseKey
RegLoadKeyW
AdjustTokenPrivileges
ControlService
RegDeleteValueA
ChangeServiceConfigW
SetSecurityDescriptorDacl
RegQueryValueExW
SetSecurityDescriptorOwner
RegConnectRegistryW
StartServiceW
OpenProcessToken
CloseServiceHandle
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetFileInfoW
Shell_NotifyIconW
ole32
CoInitialize
oleaut32
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayGetLBound
SysFreeString
Sections
.text Size: 678KB - Virtual size: 678KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gDcI Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ