NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-08_3dce10839c76a6784db790d1dbd6a6bd_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-08_3dce10839c76a6784db790d1dbd6a6bd_bkransomware.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-08_3dce10839c76a6784db790d1dbd6a6bd_bkransomware
-
Size
1.2MB
-
MD5
3dce10839c76a6784db790d1dbd6a6bd
-
SHA1
5827c50140947f094a579db38a3af769628d31f5
-
SHA256
52beee7f4ffb20be0ede0242a5ae3fc76d4d1e675220b316795477003402ff81
-
SHA512
36c26595f175aeccfd414250b37576c9315ea58c410e9ae3fa2d12aa919f15e4e15f263042358f7c30bdc1fc14285aea66e92343564a746daa6d8bb589730aa8
-
SSDEEP
12288:yyiCr8xpDMOcCxn/RcNjlbJ0+AqsmTp7FXtMHqUjZ0QPM62BxTCRALag/k0P78Ev:yy4xICxntXg/3Tz0F+R8zqTt/IZI/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-08_3dce10839c76a6784db790d1dbd6a6bd_bkransomware
Files
-
2024-05-08_3dce10839c76a6784db790d1dbd6a6bd_bkransomware.exe windows:5 windows x86 arch:x86
0e9d8aaefbc6a5028e113cf040c77213
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
winmm
timeGetTime
shlwapi
StrStrIA
PathCompactPathA
PathIsRelativeA
PathRelativePathToA
comctl32
InitCommonControlsEx
nvcuvid
cuvidDestroyDecoder
cuvidDestroyVideoParser
cuvidParseVideoData
cuvidCreateVideoParser
cuvidUnmapVideoFrame
cuvidMapVideoFrame
cuvidDecodePicture
cuvidCreateDecoder
nvcuda
cuInit
cuDeviceGetAttribute
cuDeviceTotalMem_v2
cuDeviceGetName
cuD3D9CtxCreate_v2
cuStreamDestroy_v2
cuStreamCreate
cuMemcpyDtoH_v2
cuMemFreeHost
cuMemFree_v2
cuMemAlloc_v2
cuModuleGetFunction
cuModuleLoadDataEx
cuFuncSetBlockShape
cuCtxCreate_v2
cuDeviceComputeCapability
cuDeviceGetCount
cuDeviceGet
cuCtxDestroy_v2
cuLaunchGrid
cuParamSetv
cuParamSetSize
kernel32
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
FindFirstFileExW
DeleteFileW
HeapSize
MoveFileExW
GetProcessHeap
WriteConsoleW
SetStdHandle
GetModuleFileNameW
DeleteCriticalSection
CloseHandle
GetCurrentProcessId
OpenProcess
WriteProcessMemory
FreeLibrary
GetProcAddress
LoadLibraryA
IsDebuggerPresent
CreateThread
SetEvent
ResetEvent
WaitForSingleObject
ExitThread
GetSystemDirectoryA
Sleep
ExitProcess
lstrcmpiA
GetStdHandle
SetCurrentDirectoryA
GetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FlushFileBuffers
WriteFile
CheckRemoteDebuggerPresent
CreateEventA
GetCurrentProcess
SetThreadPriority
SuspendThread
ResumeThread
SetPriorityClass
GetVersionExA
IsWow64Process
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetVolumeInformationA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
LocalAlloc
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
GetLastError
LocalFree
SetLastError
GetModuleHandleW
LoadLibraryExW
OutputDebugStringW
lstrcmpW
ExpandEnvironmentStringsW
GetFullPathNameW
VerifyVersionInfoW
VerSetConditionMask
OutputDebugStringA
GetTimeZoneInformation
GetCommandLineA
HeapReAlloc
RtlUnwind
RaiseException
SetFilePointerEx
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
ReadConsoleW
ReadFile
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
MultiByteToWideChar
AreFileApisANSI
GetModuleHandleExW
DecodePointer
EncodePointer
IsProcessorFeaturePresent
TlsSetValue
TlsFree
GetStartupInfoW
TlsGetValue
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
CompareStringW
LCMapStringW
SetEndOfFile
SetEnvironmentVariableA
lstrlenA
FileTimeToLocalFileTime
GetFileInformationByHandle
GetFileType
PeekNamedPipe
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TerminateProcess
TlsAlloc
GetDriveTypeW
GetFullPathNameA
CreateProcessA
GetCurrentDirectoryW
user32
LoadAcceleratorsA
EnableWindow
ReleaseCapture
SetCapture
SetFocus
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
GetDlgItemTextA
GetDlgItemInt
SetDlgItemInt
CreateDialogParamA
IsIconic
ShowWindow
DestroyWindow
RegisterClassA
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
GetClassNameA
EnumWindows
GetDesktopWindow
CheckMenuItem
FillRect
GetClientRect
SetWindowTextA
RedrawWindow
TranslateAcceleratorA
EndPaint
BeginPaint
SetDlgItemTextA
DialogBoxParamA
PostMessageA
SetWindowLongA
GetWindowLongA
InflateRect
SetForegroundWindow
GetMenuItemInfoA
InsertMenuItemA
RemoveMenu
FrameRect
GetSysColorBrush
GetSysColor
GetWindowRect
RemovePropA
GetPropA
SetPropA
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
DrawTextA
GetDlgCtrlID
SendDlgItemMessageA
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
CreateWindowExA
GetClassInfoExA
RegisterClassExA
CallWindowProcA
DefWindowProcA
SendMessageA
DrawFrameControl
MessageBoxA
GetSubMenu
EnableMenuItem
DrawMenuBar
EnumDisplayDevicesA
DrawIconEx
LoadImageA
LoadIconA
GetParent
GetMenu
LoadCursorA
DrawFocusRect
gdi32
SelectObject
SetBkColor
SetTextColor
GetTextMetricsA
MoveToEx
ExtTextOutA
LineTo
GetTextColor
GetStockObject
CreateCompatibleDC
CreatePen
DeleteDC
Rectangle
GetObjectA
SetDIBitsToDevice
StretchDIBits
SetStretchBltMode
SetBrushOrgEx
GetBkColor
BitBlt
CreateSolidBrush
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
SHBrowseForFolderA
ShellExecuteA
DragAcceptFiles
DragFinish
DragQueryFileA
SHGetPathFromIDListA
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoTaskMemFree
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
ws2_32
ntohl
htonl
Exports
Exports
Sections
.text Size: 701KB - Virtual size: 701KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 209KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 197.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ