E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb
Behavioral task
behavioral1
Sample
903f62623fc64a4ede7baf884b03f68e0c144d07e6c59e5779d37074174fe8bfN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
903f62623fc64a4ede7baf884b03f68e0c144d07e6c59e5779d37074174fe8bfN.exe
Resource
win10v2004-20240802-en
General
-
Target
903f62623fc64a4ede7baf884b03f68e0c144d07e6c59e5779d37074174fe8bfN
-
Size
1.1MB
-
MD5
8812963fc52b78b828b3a1742c0ed930
-
SHA1
60bd0f42df10c06c4b5e590107105b3e78a1718f
-
SHA256
903f62623fc64a4ede7baf884b03f68e0c144d07e6c59e5779d37074174fe8bf
-
SHA512
515eac5f0771a1ea0d8b9b1241188e4c3786051a2977bc17c6a4a3338d22923e43f69b9bec43cea2e98bea1a2198c6408e5d7e27b4baa1e7d344b3ef45e27c03
-
SSDEEP
24576:ZBUIKn/vwOXGUXAjCymYZiVtElVIBT2roqnTSSxWeT/XRPOO83KHUq7:F0dwAYZt6C31WeTPRPOh3uUq7
Malware Config
Extracted
djvu
http://zexeq.com/raud/get.php
-
extension
.rzml
-
offline_id
4OGfweO4lKfNTwKczrTWD8yTxQkyAGofoZhcOKt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-RX6ODkr7XJ Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0777AUSdjl
Signatures
-
Detected Djvu ransomware 1 IoCs
Processes:
resource yara_rule sample family_djvu -
Djvu family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 903f62623fc64a4ede7baf884b03f68e0c144d07e6c59e5779d37074174fe8bfN
Files
-
903f62623fc64a4ede7baf884b03f68e0c144d07e6c59e5779d37074174fe8bfN.exe windows:5 windows x86 arch:x86
0c756c849bc7b459f78f7a5ce46cd4a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcStringFreeW
UuidCreate
UuidToStringW
RpcStringFreeA
UuidToStringA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
HttpQueryInfoW
InternetOpenA
InternetOpenUrlA
winmm
timeGetTime
shlwapi
PathAppendA
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsA
PathFileExistsW
PathAppendW
PathFindExtensionW
kernel32
VirtualFree
WriteFile
GetDriveTypeA
OpenProcess
GlobalAlloc
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
Sleep
CopyFileW
FormatMessageW
lstrcpynW
CreateProcessA
TerminateProcess
ReadFile
CreateFileW
lstrcatA
GetEnvironmentVariableA
lstrcmpW
MultiByteToWideChar
lstrlenW
FlushFileBuffers
GetShortPathNameA
GetFileSizeEx
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
MoveFileW
FindClose
Process32FirstW
LocalAlloc
CreateEventW
GetModuleFileNameA
Process32NextW
lstrcatW
CreateMutexA
FindNextFileW
CreateToolhelp32Snapshot
SetEnvironmentVariableA
DeleteFileW
LocalFree
lstrcpyW
DeleteFileA
lstrcpyA
SetPriorityClass
GetCurrentProcess
GetComputerNameW
GetLogicalDrives
GetModuleFileNameW
SetStdHandle
GetVersion
CreateDirectoryA
CreateThread
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
CreateSemaphoreW
GetModuleHandleW
GetTickCount
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleA
GetVersionExA
GlobalMemoryStatus
LoadLibraryA
FlushConsoleInputBuffer
WaitForSingleObject
CreateDirectoryW
SetFilePointerEx
CreateProcessW
FreeLibrary
SetErrorMode
lstrlenA
SetFilePointer
FindFirstFileW
SetConsoleMode
CreateFileA
GetCommandLineW
GetNumberOfConsoleInputEvents
PeekConsoleInputA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
RaiseException
GetStringTypeW
GetConsoleCP
ReadConsoleW
GetConsoleMode
HeapSize
LoadLibraryExW
OutputDebugStringW
SetConsoleCtrlHandler
RtlUnwind
FatalAppExitA
GetStartupInfoW
GetExitCodeProcess
LCMapStringW
DeleteCriticalSection
AreFileApisANSI
ExitProcess
GetProcessHeap
HeapReAlloc
GlobalFree
SetEndOfFile
ReadConsoleInputA
CloseHandle
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
user32
PeekMessageW
PostThreadMessageW
DefWindowProcW
DispatchMessageW
UpdateWindow
CreateWindowExW
LoadCursorW
IsWindow
ShowWindow
RegisterClassExW
PostQuitMessage
GetMessageW
DestroyWindow
SendMessageW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
GetDesktopWindow
MessageBoxW
TranslateMessage
advapi32
RegCloseKey
CloseServiceHandle
GetUserNameW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
CryptHashData
RegSetValueExW
CryptDestroyHash
ControlService
RegOpenKeyExW
CryptCreateHash
CryptEncrypt
CryptImportKey
QueryServiceStatus
RegQueryValueExW
CryptReleaseContext
OpenServiceW
OpenSCManagerW
CryptAcquireContextW
CryptGetHashParam
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteA
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathA
ole32
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
GetErrorInfo
CreateErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
iphlpapi
GetAdaptersInfo
ws2_32
inet_ntoa
inet_addr
gethostbyname
dnsapi
DnsFree
DnsQuery_W
crypt32
CryptStringToBinaryA
gdi32
DeleteObject
GetObjectA
SelectObject
GetDeviceCaps
GetBitmapBits
BitBlt
DeleteDC
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
Sections
.text Size: 809KB - Virtual size: 809KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ