c:\builds\moz2_slave\rel-m-rel-w32_bld-000000000000\build\obj-firefox\ipc\app\plugin-container.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_990a4d51aab0566f0ec8c2377b390507_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_990a4d51aab0566f0ec8c2377b390507_bkransomware.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_990a4d51aab0566f0ec8c2377b390507_bkransomware
-
Size
1.7MB
-
MD5
990a4d51aab0566f0ec8c2377b390507
-
SHA1
63b8c7e1c836d10da1f182ae67986517d60fbebb
-
SHA256
b12067f7e90950c168c6ea2bfbd69b1ca87788d7dd86cf9a05a5f208910cf469
-
SHA512
312a1ce6859e36acf978a115350b4342207b8ac22d4497461363c03e304ad16aa26a4f13568827b0479f33330279fa781d473ec95551652106ab94479f8be42d
-
SSDEEP
24576:W5+t0pOdRMJJNK/Ry5uaewsAjTXVav9MkuLqLvss86TY3xDh:teODMJJ8y5xljkv9M7L6ss1TcDh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-27_990a4d51aab0566f0ec8c2377b390507_bkransomware
Files
-
2024-04-27_990a4d51aab0566f0ec8c2377b390507_bkransomware.exe windows:5 windows x86 arch:x86
92f377bec2fd08bb16ed274dff1cdbcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
Sleep
RaiseException
IsDebuggerPresent
GetCurrentThreadId
CloseHandle
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
GetModuleFileNameW
SetHandleInformation
VirtualFree
GetProcessHandleCount
GetCurrentProcessId
FreeLibrary
HeapSetInformation
GetCurrentDirectoryW
GetFileType
SignalObjectAndWait
CreateFileW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetModuleHandleExW
SetLastError
GetVolumeInformationW
LocalFree
GetLastError
GetSystemDirectoryW
GetComputerNameW
TerminateProcess
ExpandEnvironmentStringsW
LoadLibraryExA
GetModuleHandleA
VirtualAllocEx
VirtualProtectEx
GetProcAddress
VerifyVersionInfoW
FlushInstructionCache
GetModuleHandleW
SetEnvironmentVariableW
GetCurrentProcess
VerSetConditionMask
SetDllDirectoryW
GetEnvironmentVariableW
ReleaseActCtx
MultiByteToWideChar
CreateActCtxW
VirtualQuery
GetCommandLineW
HeapFree
EncodePointer
DecodePointer
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
LoadLibraryExW
ExitProcess
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetStartupInfoW
WriteFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
RtlUnwind
OutputDebugStringW
winmm
timeGetTime
advapi32
RegCloseKey
RegOpenKeyExW
RevertToSelf
RegDisablePredefinedCache
GetLengthSid
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
ConvertSidToStringSidW
LookupAccountNameW
Exports
Exports
?ProvideLogFunction@sandboxing@mozilla@@YAXP6AXPBD00_NI@Z@Z
?moz_Xinvalid_argument@std@@YAXPBD@Z
?moz_Xlength_error@std@@YAXPBD@Z
?moz_Xout_of_range@std@@YAXPBD@Z
?moz_Xoverflow_error@std@@YAXPBD@Z
?moz_Xruntime_error@std@@YAXPBD@Z
?mozalloc_abort@@YAXQBD@Z
?mozalloc_handle_oom@@YAXI@Z
?mozalloc_set_oom_abort_handler@@YAXP6AXI@Z@Z
IsSandboxedProcess
_TargetCreateNamedPipeW@36
_TargetCreateProcessA@44
_TargetCreateProcessW@44
_TargetGdiDllInitialize@12
_TargetGetStockObject@8
_TargetNtCreateEvent@24
_TargetNtCreateFile@48
_TargetNtCreateKey@32
_TargetNtMapViewOfSection@44
_TargetNtOpenEvent@16
_TargetNtOpenFile@28
_TargetNtOpenKey@16
_TargetNtOpenKeyEx@20
_TargetNtOpenProcess@20
_TargetNtOpenProcessToken@16
_TargetNtOpenProcessTokenEx@20
_TargetNtOpenThread@20
_TargetNtOpenThreadToken@20
_TargetNtOpenThreadTokenEx@24
_TargetNtQueryAttributesFile@12
_TargetNtQueryFullAttributesFile@12
_TargetNtSetInformationFile@24
_TargetNtSetInformationThread@20
_TargetNtUnmapViewOfSection@12
_TargetRegisterClassW@8
g_handles_to_close
g_interceptions
g_nt
g_originals
g_shared_IPC_size
g_shared_delayed_integrity_level
g_shared_delayed_mitigations
g_shared_policy_size
g_shared_section
moz_xcalloc
moz_xmalloc
moz_xrealloc
moz_xstrdup
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ