Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_7d0ada41dcddd55aecc3cb0999a744b3_bkransomware_metamorfo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_7d0ada41dcddd55aecc3cb0999a744b3_bkransomware_metamorfo.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-10-01_7d0ada41dcddd55aecc3cb0999a744b3_bkransomware_metamorfo
-
Size
6.7MB
-
MD5
7d0ada41dcddd55aecc3cb0999a744b3
-
SHA1
15257a80cbc312b2b8a8adbed2e9d8cba48e530a
-
SHA256
66f61505ec10338855e37b6273ee9cb89031ce02bf86be09b1a1929d70cd1aed
-
SHA512
a1b27cdec4740ec84bf465e288f89d60726d2d7280e617d60e2b3122207c10a3e5dde2797be85c290115fc4e12376abff352a8f76aea649e2ac3bfd4cdd6b411
-
SSDEEP
98304:+T37vqsExujWvg3T+iKCB2pqdBsntt1foHMPgttvBeUv1C5A5AnvWbp7B20Hh2Hl:+/KKgsEJVQvYrAWnH64BYyn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-01_7d0ada41dcddd55aecc3cb0999a744b3_bkransomware_metamorfo
Files
-
2024-10-01_7d0ada41dcddd55aecc3cb0999a744b3_bkransomware_metamorfo.exe windows:6 windows x86 arch:x86
e1ca9a20a891a1f4883a5b0e6018501b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
LCMapStringW
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SwitchToThread
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
GetVersion
GetUserDefaultUILanguage
GetThreadPriority
LockResource
GetThreadLocale
GetLastError
GetCPInfoExW
SetThreadPriority
ExitThread
FileTimeToSystemTime
GetExitCodeProcess
HeapDestroy
SizeofResource
Sleep
LoadLibraryW
GetUserDefaultLangID
GetPrivateProfileStringW
SignalObjectAndWait
GetTempFileNameW
GetUserDefaultLCID
CompareFileTime
GetSystemDefaultUILanguage
EncodePointer
GetFullPathNameW
SuspendThread
DeleteFileW
IsDebuggerPresent
GetDiskFreeSpaceW
FormatMessageW
ReadProcessMemory
CreateDirectoryW
VerSetConditionMask
EnumCalendarInfoW
SystemTimeToFileTime
LoadResource
FindResourceW
EnumResourceNamesW
GetFileType
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
CreateFileW
user32
DestroyWindow
GetMessageW
PostQuitMessage
SendDlgItemMessageA
RegisterWindowMessageW
SetCapture
IsZoomed
SetParent
SetScrollRange
GetWindowTextA
MessageBoxA
EnableMenuItem
DestroyCaret
EnumChildWindows
ShowWindow
GetMenuItemCount
CreateWindowExW
ScrollWindowEx
RegisterClassW
SetCaretPos
SetWindowTextA
GetDlgItemTextW
SendMessageW
UpdateWindow
LoadCursorA
GetDlgItemTextA
SetMenuItemInfoW
GetDlgItem
TranslateMDISysAccel
RegisterClassA
SetCursor
GetWindowRect
CharUpperBuffW
CharNextW
SetKeyboardState
PostMessageW
MsgWaitForMultipleObjects
LoadIconA
RemovePropA
MessageBeep
GetMenuStringW
SetFocus
DrawEdge
GetMenuItemInfoW
GetDoubleClickTime
GetDC
ShowCursor
GetKeyboardState
SetPropA
GetScrollInfo
UnionRect
InvalidateRect
SetScrollPos
MonitorFromWindow
CharUpperW
DefWindowProcA
SetWindowsHookExA
GetDesktopWindow
SetMenu
AppendMenuA
IsWindow
GetKeyboardType
SystemParametersInfoA
ReleaseCapture
MapWindowPoints
ValidateRect
CheckMenuItem
SetDlgItemTextA
gdi32
BitBlt
GetWindowOrgEx
DeleteDC
CopyEnhMetaFileA
CreateHalftonePalette
PolyPolyline
SetMapMode
CreateCompatibleBitmap
RealizePalette
SetPaletteEntries
CreateRectRgn
GetPixel
GetStockObject
ExtCreatePen
MaskBlt
CreateFontA
CreateFontIndirectA
ExcludeClipRect
CreatePalette
DeleteObject
CreatePenIndirect
Rectangle
CreateBrushIndirect
SaveDC
GetObjectType
GetCurrentPositionEx
GetCharWidth32A
GetCharABCWidthsFloatA
Polyline
GetClipBox
RectVisible
ExtTextOutA
CreateSolidBrush
SetBkColor
comdlg32
GetSaveFileNameW
advapi32
RegSetValueExW
AllocateAndInitializeSid
RegConnectRegistryW
EqualSid
RegLoadKeyW
RegEnumKeyExW
QueryServiceStatus
RegGetKeySecurity
CopySid
OpenServiceW
OpenSCManagerW
CloseServiceHandle
shell32
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
ExtractIconExW
oleaut32
SafeArrayGetUBound
VariantChangeType
SafeArrayCreate
VariantClear
VariantInit
VariantCopy
Sections
.text Size: 705KB - Virtual size: 705KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sBk Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ