Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_911469a3d2d2ca2163a3079ede910e5a_bkransomware.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_911469a3d2d2ca2163a3079ede910e5a_bkransomware.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-23_911469a3d2d2ca2163a3079ede910e5a_bkransomware
-
Size
427KB
-
MD5
911469a3d2d2ca2163a3079ede910e5a
-
SHA1
56f14904ff7e039e11c09ed741bcff1280f37eb3
-
SHA256
e5f85e18c757ce89c03d848b1ae77ed0be7fee17a5329e687486a91774d727b2
-
SHA512
4cb089a769bba20211f2ae7e824ca05844a651762d1f5dec4dd4b91aaf21966a889afb1f72b29de8217072e86e7c3310cf95c37c60e02c3b551f7b5a68e0b88c
-
SSDEEP
12288:kDfyadKneG7KOyqFUqxX3/i5Gum6c0FjGmKuqZNMRuDEOPKXsvdI/Oy0Vvr:wfvOAXRuD18AdT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-23_911469a3d2d2ca2163a3079ede910e5a_bkransomware
Files
-
2024-05-23_911469a3d2d2ca2163a3079ede910e5a_bkransomware.exe windows:5 windows x86 arch:x86
0969bd71d8bbd28af0f3ddf55c84e043
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReleaseMutex
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
SetCurrentDirectoryW
GetProcAddress
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
SetEnvironmentVariableA
HeapSize
WriteConsoleW
LCMapStringW
CompareStringW
GetLastError
CreateFileW
OutputDebugStringW
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
SetStdHandle
GetModuleFileNameW
TerminateProcess
GetFileAttributesW
CopyFileW
Sleep
LoadLibraryW
CreateDirectoryW
FlushFileBuffers
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
WriteFile
GetCurrentProcess
CreateProcessW
GetStringTypeW
GetProcessHeap
FreeLibrary
FileTimeToSystemTime
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
InterlockedExchange
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetThreadPriority
SetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
DuplicateHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateEventA
LoadLibraryA
GetTickCount
SleepEx
VerSetConditionMask
GetSystemDirectoryA
VerifyVersionInfoA
FormatMessageA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
ExpandEnvironmentStringsA
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineA
RtlUnwind
CreateThread
ExitThread
LoadLibraryExW
GetTimeZoneInformation
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
advapi32
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegSetValueExW
RegCloseKey
RegCreateKeyExW
ws2_32
htonl
ioctlsocket
gethostname
listen
accept
ntohl
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
select
__WSAFDIsSet
socket
WSACleanup
WSAStartup
WSAGetLastError
WSASetLastError
sendto
crypt32
CertFreeCertificateContext
wldap32
ord46
ord211
ord45
ord50
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
Sections
.text Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ