E:\BUILD\CM_XPM_WK\CM_RELEASE_6_40\wibu\cm\dev\RunTime\exe\obj\Release\winX86V12W\CodeMeter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_2e3feea072b81298eb7dbb85ba5da2ce_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-17_2e3feea072b81298eb7dbb85ba5da2ce_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-17_2e3feea072b81298eb7dbb85ba5da2ce_bkransomware
-
Size
4.6MB
-
MD5
2e3feea072b81298eb7dbb85ba5da2ce
-
SHA1
c45f8c3d0f46616eba4061bc20be35b97f096b84
-
SHA256
47da5c4114de6b3a26f591cb00ce80511454eff5c9293bc10da9c8f4f1873118
-
SHA512
d8271ab112b17323395bd359120437969b09665c81d69788bc08e9544e487ad4e8b0ea9688f23bb150774eeafbe6d5e62c473eb65be7545d56d8cee6fe214003
-
SSDEEP
98304:MBe40bl9dRPenSX5gSoCl0DHDB1dE06VOw/:Z3Nenql86/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-17_2e3feea072b81298eb7dbb85ba5da2ce_bkransomware
Files
-
2024-05-17_2e3feea072b81298eb7dbb85ba5da2ce_bkransomware.exe windows:5 windows x86 arch:x86
fc331e21a1c50ae9f60d3a0c23b3669a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
PDB Paths
Imports
secur32
GetUserNameExW
kernel32
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFileAttributesA
GetFullPathNameA
GetTempPathA
GetStartupInfoA
SetConsoleCtrlHandler
TerminateProcess
GetExitCodeProcess
GetLogicalDriveStringsA
QueryDosDeviceA
CreateDirectoryA
DeleteFileA
SetFileAttributesA
SetFileTime
GetTempFileNameA
CopyFileA
MoveFileA
FindClose
FindFirstFileA
FindNextFileA
GetUserDefaultUILanguage
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
GetStdHandle
GetConsoleScreenBufferInfo
FlushConsoleInputBuffer
GetConsoleMode
GetNumberOfConsoleInputEvents
ReadConsoleInputA
SetConsoleMode
FlushFileBuffers
GetFileSizeEx
GetFileTime
ReadFile
SetEndOfFile
ExpandEnvironmentStringsA
GetVersionExA
SleepEx
GetSystemTimeAsFileTime
DeviceIoControl
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateDirectoryW
GetDiskFreeSpaceW
GetFileSize
GetVolumeInformationW
SetFileAttributesW
GetLogicalDriveStringsW
SetFilePointerEx
ReplaceFileA
FileTimeToLocalFileTime
LocalFree
GetComputerNameExA
IsBadReadPtr
LocalAlloc
CancelIo
FormatMessageW
QueryPerformanceCounter
GetStringTypeW
EncodePointer
DecodePointer
DuplicateHandle
GetTimeZoneInformation
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
WritePrivateProfileSectionA
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
WaitForMultipleObjects
OpenEventA
CreateEventA
ResetEvent
ExitThread
GetCurrentThreadId
Sleep
WaitForSingleObject
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VerifyVersionInfoW
AreFileApisANSI
LoadLibraryA
FormatMessageA
GetModuleHandleA
IsWow64Process
GetCurrentProcess
SetLastError
VerSetConditionMask
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExA
GetProcAddress
FreeLibrary
RaiseException
OpenProcess
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentThread
ExitProcess
GetModuleFileNameA
OpenSemaphoreA
GetTickCount
SetEvent
SetErrorMode
QueryDosDeviceW
GetDriveTypeW
GetDriveTypeA
WriteFile
CreateFileW
lstrcmpiA
GetLastError
CreateFileA
OpenFileMappingA
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
CloseHandle
OutputDebugStringA
lstrlenA
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
WriteConsoleW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetEnvironmentVariableW
CreateSemaphoreA
SetFilePointer
SetStdHandle
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
ReadConsoleW
GetConsoleCP
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryW
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
HeapSize
GetModuleFileNameW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
CreateSemaphoreW
GetStartupInfoW
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
LoadLibraryExW
GetCPInfo
GetCommandLineA
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
GetModuleHandleW
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
CreateTimerQueue
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
advapi32
LookupAccountNameA
SetSecurityDescriptorDacl
RegCloseKey
CryptGenRandom
QueryServiceStatusEx
LsaQueryInformationPolicy
LsaOpenPolicy
LsaClose
LsaFreeMemory
ConvertSidToStringSidA
ReadEventLogA
OpenEventLogA
CloseEventLog
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
GetUserNameA
GetLengthSid
CopySid
RegConnectRegistryA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegDeleteValueA
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
ChangeServiceConfig2A
LookupPrivilegeNameA
StartServiceCtrlDispatcherA
SetServiceStatus
RegisterServiceCtrlHandlerExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
RegSetValueExA
RegFlushKey
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
FreeSid
EqualSid
AllocateAndInitializeSid
LookupAccountSidA
GetTokenInformation
OpenProcessToken
LookupPrivilegeValueA
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
InitializeSecurityDescriptor
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetPathFromIDListA
SHGetFolderLocation
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
iphlpapi
GetAdaptersAddresses
GetIpAddrTable
ws2_32
getpeername
WSACleanup
WSAStartup
listen
accept
__WSAFDIsSet
WSAGetLastError
socket
setsockopt
sendto
recvfrom
inet_ntoa
htons
getaddrinfo
getsockname
bind
shutdown
send
select
recv
closesocket
gethostname
freeaddrinfo
WSARecv
connect
getsockopt
WSASend
inet_addr
ntohl
gethostbyname
ntohs
WSASetLastError
ioctlsocket
htonl
gethostbyaddr
getnameinfo
netapi32
NetApiBufferFree
NetServerEnum
NetGroupEnum
NetUserGetGroups
NetUserEnum
DsEnumerateDomainTrustsA
psapi
GetModuleFileNameExA
setupapi
CMP_WaitNoPendingInstallEvents
SetupDiGetClassDevsA
CM_Get_Child
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
CM_Get_Device_IDA
CM_Get_Device_ID_Size
CM_Get_DevNode_Registry_PropertyA
CM_Get_Parent
CM_Get_Sibling
SetupDiOpenDeviceInfoA
SetupDiEnumDeviceInfo
SetupDiGetDeviceInterfaceDetailA
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 539KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 184KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 185KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ