C:\Users\Ryu\Dropbox\dev\siv3d\ParticleTest\Release\ParticleTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_3bbf496d1a97225193d096c109026405_bkransomware.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_3bbf496d1a97225193d096c109026405_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-16_3bbf496d1a97225193d096c109026405_bkransomware
-
Size
4.9MB
-
MD5
3bbf496d1a97225193d096c109026405
-
SHA1
60748f4157a8c15991063e257747363dfd39c664
-
SHA256
0a023f2a9695798c3cc3c0da5a52d172b262d177ece5a6e45e3c6f962a987649
-
SHA512
32fcf3cf707f677cec21744724d3cb131d1b7ea9ea32795c0f72e637f8764c0cc0c46083b28aead66b972335c7adaaaebdc00569ffcdb61fe65234ab16b94a78
-
SSDEEP
98304:n75wMm4a5PFaEO0tkQ2iqpiOiONZGUKg/OWIy7vrMF74MMuCGaq:75wMm4a5PFaEtqUOistKg/OWV67
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-16_3bbf496d1a97225193d096c109026405_bkransomware
Files
-
2024-05-16_3bbf496d1a97225193d096c109026405_bkransomware.exe windows:6 windows x86 arch:x86
6aaa83d4b9d54343d0ad9f053d3cd4ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
midiOutClose
midiOutOpen
mmioSeek
mmioRead
timeBeginPeriod
midiOutPrepareHeader
waveInStart
joyGetDevCapsW
joyGetNumDevs
joyGetPosEx
waveInReset
waveInStop
waveInAddBuffer
waveInPrepareHeader
waveInClose
waveInOpen
waveInGetDevCapsW
waveInGetNumDevs
timeGetTime
midiOutLongMsg
midiOutShortMsg
mmioClose
mmioOpenW
timeEndPeriod
midiOutUnprepareHeader
gdiplus
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipSaveImageToFile
GdipSaveImageToStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
shlwapi
ord214
ord184
ord12
ord219
wininet
InternetGetConnectedState
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
InternetReadFile
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetCrackUrlW
ws2_32
WSACleanup
WSAStartup
imm32
ImmSetCompositionFontW
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
crypt32
CryptBinaryToStringW
kernel32
WriteConsoleW
SetStdHandle
UnregisterWaitEx
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
DuplicateHandle
CreateEventA
CreateSemaphoreA
QueryDepthSList
LoadLibraryA
SystemTimeToTzSpecificLocalTime
GetTimeFormatW
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
FileTimeToLocalFileTime
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesExW
GetFullPathNameW
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
FileTimeToSystemTime
FreeLibrary
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringW
GetCommandLineW
LocalFree
GetProcAddress
GetModuleHandleW
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
GetExitCodeThread
HeapCreate
HeapDestroy
HeapAlloc
CreateThread
GetCurrentThread
SuspendThread
ResumeThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetCurrentThreadId
ResetEvent
CreateFileW
ReadFile
SetFilePointerEx
SetEndOfFile
WriteFile
GetLocalTime
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetLastError
FindFirstFileExW
GetFileInformationByHandle
AreFileApisANSI
GetStringTypeW
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
ExitThread
LoadLibraryExW
GetCPInfo
IsDebuggerPresent
IsProcessorFeaturePresent
SetEnvironmentVariableW
GetCurrentDirectoryW
CreateDirectoryW
GetDriveTypeW
SetEnvironmentVariableA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
CreateSemaphoreW
CreateTimerQueue
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetDateFormatW
PeekNamedPipe
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
GetProcessHeap
GetStdHandle
GetFileType
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
user32
CreateWindowExW
DestroyWindow
ShowWindow
UpdateLayeredWindow
GetSystemMetrics
UpdateWindow
GetDC
ReleaseDC
LoadCursorW
LoadIconW
SendMessageW
SetWindowPos
GetWindowPlacement
GetForegroundWindow
SetForegroundWindow
ValidateRect
TranslateMessage
GetWindowRect
AdjustWindowRect
AdjustWindowRectEx
GetCursorPos
ClipCursor
ScreenToClient
SetWindowLongW
FindWindowW
DestroyIcon
RegisterClassExW
MessageBoxW
WaitForInputIdle
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
IsClipboardFormatAvailable
AttachThreadInput
RegisterTouchWindow
GetWindowThreadProcessId
FillRect
SetCursorPos
SetCursor
ClientToScreen
PostQuitMessage
GetTouchInputInfo
CloseTouchInputHandle
SetCapture
ReleaseCapture
GetMouseMovePointsEx
GetKeyboardState
wsprintfW
PostMessageW
SendMessageA
IsWindow
MoveWindow
UnregisterClassW
DefWindowProcW
PeekMessageW
CreateIconIndirect
DispatchMessageW
SetWindowTextW
gdi32
CreateFontIndirectW
TextOutW
StrokeAndFillPath
EndPath
BeginPath
GetTextMetricsW
SetBkMode
AddFontMemResourceEx
RemoveFontResourceExW
AddFontResourceExW
GetGlyphOutlineW
CreateSolidBrush
CreatePen
GetObjectW
SetPixel
GetDIBits
CreateCompatibleBitmap
CreateBitmap
CreateDIBSection
SelectObject
GetStockObject
DeleteObject
DeleteDC
CreateCompatibleDC
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ChooseFontW
ChooseColorW
shell32
SHAppBarMessage
SHGetMalloc
SHFileOperationW
DragQueryFileW
DragAcceptFiles
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHBrowseForFolderW
DragQueryPoint
DragFinish
ShellExecuteW
CommandLineToArgvW
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
PropVariantClear
CreateStreamOnHGlobal
CoInitializeEx
CoUninitialize
oleaut32
VariantInit
OleCreatePropertyFrame
VariantClear
msvfw32
ICDecompress
ICOpen
ICClose
ICSendMessage
avifil32
AVIFileRelease
AVIStreamGetFrameClose
AVIStreamGetFrame
AVIStreamGetFrameOpen
AVIFileOpenA
AVIStreamInfoA
AVIStreamRelease
AVIFileGetStream
AVIFileInit
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 765KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ