D:\CTCNEW\Function\PM2\Beamtuning\Obj_PFGTuning\Debug\Sequence.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_85be068698b24d25c93aba06950fbcca_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_85be068698b24d25c93aba06950fbcca_bkransomware.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-21_85be068698b24d25c93aba06950fbcca_bkransomware
-
Size
491KB
-
MD5
85be068698b24d25c93aba06950fbcca
-
SHA1
9a74323b82de671c0536f0e71da66ddb1bf45440
-
SHA256
677f202a603340f179db1f3018356e8d7064cd18a87dacab887cbe487e379086
-
SHA512
f7d55f1f9f7498c24130593d5df10662844500055163bede383814376d30e4a34790579fc795719c6f4facaf8ac02bd55f26e2c2416059bfff1a59d71180d13c
-
SSDEEP
6144:qBqKHs3s4H4rzOK74UoNWcZLR8KdlWgHvBdb0:yCsW43OK7q5R8KdB0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-21_85be068698b24d25c93aba06950fbcca_bkransomware
Files
-
2024-05-21_85be068698b24d25c93aba06950fbcca_bkransomware.exe windows:6 windows x86 arch:x86
d4cd62aaaffd1d2a1c23cd1294752f0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
_lopen
_lcreat
_lclose
Sleep
GetTickCount
GetLocalTime
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetLastError
GetOverlappedResult
WriteFile
SetConsoleTitleA
AllocConsole
FreeConsole
ReadFile
CreateEventA
MapViewOfFile
OpenFileMappingA
InitializeCriticalSection
WaitNamedPipeA
CreateFileA
_lread
GetMailslotInfo
CreateMailslotA
UnmapViewOfFile
CreateFileMappingA
CreateFileW
HeapReAlloc
FlushFileBuffers
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
OutputDebugStringW
_lwrite
lstrlenA
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
RemoveDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCommandLineA
HeapFree
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
CreateThread
ExitThread
ResumeThread
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
HeapSize
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
SetLastError
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
RtlUnwind
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
MoveFileExW
DeleteFileW
SetEndOfFile
user32
FindWindowA
SendMessageA
InvalidateRect
GetWindowLongA
SetWindowLongA
SetWindowPos
ShowWindow
SetForegroundWindow
MoveWindow
GetDesktopWindow
GetWindowRect
GetSystemMetrics
Sections
.text Size: 386KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ