Static task
static1
Behavioral task
behavioral1
Sample
2024-05-13_8d33cc5bf11ab386445225dc4f754879_bkransomware.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-13_8d33cc5bf11ab386445225dc4f754879_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-13_8d33cc5bf11ab386445225dc4f754879_bkransomware
-
Size
427KB
-
MD5
8d33cc5bf11ab386445225dc4f754879
-
SHA1
6aaae07a03be95d9eacac0f94250c28c0256ba0a
-
SHA256
88e8c45f1112a0c3bb39645eda319f97b3f77be7af60f1ac4e327c1f460709da
-
SHA512
e3eca390734bb36bf378c6e1076d762d5c5e251c11bad33c9c1450cec84493b918b040badb71e75bef6382fe1e2f0dccf121d4a5fc5877f56211bf6aa11ff2b1
-
SSDEEP
12288:kDfyadKneG7KOyqFUqxX3/i5Gum6c0FjGmKuqZNMRuDEOPKXsvdI/Oy0Vvq:wfvOAXRuD18Ady
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-13_8d33cc5bf11ab386445225dc4f754879_bkransomware
Files
-
2024-05-13_8d33cc5bf11ab386445225dc4f754879_bkransomware.exe windows:5 windows x86 arch:x86
0969bd71d8bbd28af0f3ddf55c84e043
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReleaseMutex
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
SetCurrentDirectoryW
GetProcAddress
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
SetEnvironmentVariableA
HeapSize
WriteConsoleW
LCMapStringW
CompareStringW
GetLastError
CreateFileW
OutputDebugStringW
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
SetStdHandle
GetModuleFileNameW
TerminateProcess
GetFileAttributesW
CopyFileW
Sleep
LoadLibraryW
CreateDirectoryW
FlushFileBuffers
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
WriteFile
GetCurrentProcess
CreateProcessW
GetStringTypeW
GetProcessHeap
FreeLibrary
FileTimeToSystemTime
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
InterlockedExchange
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetThreadPriority
SetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
DuplicateHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateEventA
LoadLibraryA
GetTickCount
SleepEx
VerSetConditionMask
GetSystemDirectoryA
VerifyVersionInfoA
FormatMessageA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
ExpandEnvironmentStringsA
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineA
RtlUnwind
CreateThread
ExitThread
LoadLibraryExW
GetTimeZoneInformation
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
advapi32
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegSetValueExW
RegCloseKey
RegCreateKeyExW
ws2_32
htonl
ioctlsocket
gethostname
listen
accept
ntohl
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
select
__WSAFDIsSet
socket
WSACleanup
WSAStartup
WSAGetLastError
WSASetLastError
sendto
crypt32
CertFreeCertificateContext
wldap32
ord46
ord211
ord45
ord50
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
Sections
.text Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ