c:\builds\moz2_slave\rel-m-rel-w32_bld-000000000000\build\obj-firefox\ipc\app\plugin-container.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_808a2654b93c4ab8b466da102e87230b_bkransomware.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-29_808a2654b93c4ab8b466da102e87230b_bkransomware.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-29_808a2654b93c4ab8b466da102e87230b_bkransomware
-
Size
4.0MB
-
MD5
808a2654b93c4ab8b466da102e87230b
-
SHA1
fd178dc832ec2c89138d4b55d29655b2f0e0ee74
-
SHA256
1f3015d4597c8941b9d09412ba1b1f3b1dec71a49a962b30a972f6731b1209b3
-
SHA512
bb863ba2806ffb6bc89f3460ecc1f479ece58bcb1c5b2df0f5a5a915494ba7303430d667550db89c183a03692d915b53a87ec1eb57fd810554fde4ccb392e2d4
-
SSDEEP
98304:teR8WJ+RYNAKvkTgXuquveY+W2o8oT3ezMrl9cekcHhXh9HJUiWUXsmqsqzl87an:ZmAPuQ4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-29_808a2654b93c4ab8b466da102e87230b_bkransomware
Files
-
2024-04-29_808a2654b93c4ab8b466da102e87230b_bkransomware.exe windows:5 windows x86 arch:x86
92f377bec2fd08bb16ed274dff1cdbcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
Sleep
RaiseException
IsDebuggerPresent
GetCurrentThreadId
CloseHandle
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
GetModuleFileNameW
SetHandleInformation
VirtualFree
GetProcessHandleCount
GetCurrentProcessId
FreeLibrary
HeapSetInformation
GetCurrentDirectoryW
GetFileType
SignalObjectAndWait
CreateFileW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetModuleHandleExW
SetLastError
GetVolumeInformationW
LocalFree
GetLastError
GetSystemDirectoryW
GetComputerNameW
TerminateProcess
ExpandEnvironmentStringsW
LoadLibraryExA
GetModuleHandleA
VirtualAllocEx
VirtualProtectEx
GetProcAddress
VerifyVersionInfoW
FlushInstructionCache
GetModuleHandleW
SetEnvironmentVariableW
GetCurrentProcess
VerSetConditionMask
SetDllDirectoryW
GetEnvironmentVariableW
ReleaseActCtx
MultiByteToWideChar
CreateActCtxW
VirtualQuery
GetCommandLineW
HeapFree
EncodePointer
DecodePointer
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
LoadLibraryExW
ExitProcess
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetStartupInfoW
WriteFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
RtlUnwind
OutputDebugStringW
winmm
timeGetTime
advapi32
RegCloseKey
RegOpenKeyExW
RevertToSelf
RegDisablePredefinedCache
GetLengthSid
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
ConvertSidToStringSidW
LookupAccountNameW
Exports
Exports
?ProvideLogFunction@sandboxing@mozilla@@YAXP6AXPBD00_NI@Z@Z
?moz_Xinvalid_argument@std@@YAXPBD@Z
?moz_Xlength_error@std@@YAXPBD@Z
?moz_Xout_of_range@std@@YAXPBD@Z
?moz_Xoverflow_error@std@@YAXPBD@Z
?moz_Xruntime_error@std@@YAXPBD@Z
?mozalloc_abort@@YAXQBD@Z
?mozalloc_handle_oom@@YAXI@Z
?mozalloc_set_oom_abort_handler@@YAXP6AXI@Z@Z
IsSandboxedProcess
_TargetCreateNamedPipeW@36
_TargetCreateProcessA@44
_TargetCreateProcessW@44
_TargetGdiDllInitialize@12
_TargetGetStockObject@8
_TargetNtCreateEvent@24
_TargetNtCreateFile@48
_TargetNtCreateKey@32
_TargetNtMapViewOfSection@44
_TargetNtOpenEvent@16
_TargetNtOpenFile@28
_TargetNtOpenKey@16
_TargetNtOpenKeyEx@20
_TargetNtOpenProcess@20
_TargetNtOpenProcessToken@16
_TargetNtOpenProcessTokenEx@20
_TargetNtOpenThread@20
_TargetNtOpenThreadToken@20
_TargetNtOpenThreadTokenEx@24
_TargetNtQueryAttributesFile@12
_TargetNtQueryFullAttributesFile@12
_TargetNtSetInformationFile@24
_TargetNtSetInformationThread@20
_TargetNtUnmapViewOfSection@12
_TargetRegisterClassW@8
g_handles_to_close
g_interceptions
g_nt
g_originals
g_shared_IPC_size
g_shared_delayed_integrity_level
g_shared_delayed_mitigations
g_shared_policy_size
g_shared_section
moz_xcalloc
moz_xmalloc
moz_xrealloc
moz_xstrdup
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ