c:\builds\moz2_slave\rel-m-rel-w32_bld-000000000000\build\obj-firefox\toolkit\crashreporter\client\crashreporter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_e839721f3b5145a8acf527470c895c0c_bkransomware.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-14_e839721f3b5145a8acf527470c895c0c_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-14_e839721f3b5145a8acf527470c895c0c_bkransomware
-
Size
3.7MB
-
MD5
e839721f3b5145a8acf527470c895c0c
-
SHA1
a875fe18a0b8c9794193f706371f7dba487454aa
-
SHA256
7c1ec747a4695ac30f19e5850d78396c69bcf4ee2d005b05f05184a7fb496a51
-
SHA512
153306fd733808e96b562854608e2e6f3d9a027b991416c371f3ef2596fa182cda96287fa64ebeab4744cf700ef839420aa385a1ea239b0c65a71dc947323da7
-
SSDEEP
98304:xhHjeUJF3noxDIqnstLE4L9IW1dXg3S/MHmgH:HH732EqnhD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-14_e839721f3b5145a8acf527470c895c0c_bkransomware
Files
-
2024-05-14_e839721f3b5145a8acf527470c895c0c_bkransomware.exe windows:5 windows x86 arch:x86
0708cfb7f9d9ac2a0da6d82bac0e6d8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameW
MultiByteToWideChar
GlobalUnlock
VerifyVersionInfoW
GetLastError
GetProcAddress
MoveFileW
GlobalFree
LockResource
FindNextFileW
CloseHandle
DeleteFileW
LocalFree
CreateThread
GetSystemTimeAsFileTime
GetCurrentProcess
WriteFile
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
Sleep
LeaveCriticalSection
ReadFile
EnterCriticalSection
DeleteCriticalSection
SetUnhandledExceptionFilter
GetFileAttributesW
GetSystemTime
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
ReadConsoleW
SetEnvironmentVariableW
OutputDebugStringW
HeapReAlloc
QueryPerformanceCounter
GetTimeZoneInformation
LoadLibraryExW
GetOEMCP
GetACP
IsValidCodePage
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetProcessHeap
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
SetEndOfFile
GetTimeFormatW
GetDateFormatW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
FormatMessageW
SizeofResource
LoadLibraryW
WideCharToMultiByte
GetModuleHandleW
GlobalAlloc
WaitForSingleObject
GlobalLock
CreateDirectoryW
CompareFileTime
VerSetConditionMask
CreateProcessW
LoadResource
FreeLibrary
FindResourceW
FindFirstFileW
RtlUnwind
RaiseException
GetCPInfo
GetCommandLineW
GetModuleHandleExW
ExitProcess
HeapAlloc
HeapFree
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
DecodePointer
EncodePointer
user32
GetPropW
SetWindowTextW
EnableWindow
MapWindowPoints
CallWindowProcW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxW
OpenClipboard
IsDlgButtonChecked
MoveWindow
SendMessageW
EndPaint
CloseClipboard
SetTimer
RemovePropW
GetWindowRect
FillRect
PostMessageW
DrawTextW
DialogBoxIndirectParamW
GetFocus
DialogBoxParamW
IsClipboardFormatAvailable
GetClientRect
SetFocus
BeginPaint
SetPropW
GetDC
ChildWindowFromPoint
LoadIconW
InvalidateRect
GetWindowLongW
GetClipboardData
GetWindowTextW
GetDlgItem
SetWindowLongW
EndDialog
SendDlgItemMessageW
GetSysColor
CheckDlgButton
ShowWindow
GetSysColorBrush
IsWindowEnabled
gdi32
SetTextColor
SetBkMode
SelectObject
GetStockObject
GetTextExtentPoint32W
advapi32
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
comctl32
InitCommonControlsEx
shell32
SHGetFolderPathW
wininet
InternetQueryDataAvailable
InternetCrackUrlW
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpAddRequestHeadersW
HttpQueryInfoW
HttpOpenRequestW
InternetCloseHandle
InternetOpenW
shlwapi
PathAppendW
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ