c:\builds\moz2_slave\rel-m-rel-w32_bld-000000000000\build\obj-firefox\ipc\app\plugin-container.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_6070e6df183e15b8ce9acac61d4fb9cf_bkransomware.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-24_6070e6df183e15b8ce9acac61d4fb9cf_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_6070e6df183e15b8ce9acac61d4fb9cf_bkransomware
-
Size
3.0MB
-
MD5
6070e6df183e15b8ce9acac61d4fb9cf
-
SHA1
c7ef2129bd7f0f257d073e9ce98efd915d88850c
-
SHA256
b875438a52394aeac08c0e9d32737ee761c0d6ec7a6cfa130153081136062315
-
SHA512
c7400adbb91900629841de1ebdae353b8cd68896bf1ae68df22abeb9752107b02d3ee32b6c53eb3640bb69bbbd17eb83e150138b470ff37015a7e993169ea5dc
-
SSDEEP
49152:teOD1k1Inu5HOTroJdXN0BMOwLloBrugz2RAR5FeA6w:te7DH5JdXN0B7+sj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_6070e6df183e15b8ce9acac61d4fb9cf_bkransomware
Files
-
2024-05-24_6070e6df183e15b8ce9acac61d4fb9cf_bkransomware.exe windows:5 windows x86 arch:x86
92f377bec2fd08bb16ed274dff1cdbcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
Sleep
RaiseException
IsDebuggerPresent
GetCurrentThreadId
CloseHandle
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
GetModuleFileNameW
SetHandleInformation
VirtualFree
GetProcessHandleCount
GetCurrentProcessId
FreeLibrary
HeapSetInformation
GetCurrentDirectoryW
GetFileType
SignalObjectAndWait
CreateFileW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetModuleHandleExW
SetLastError
GetVolumeInformationW
LocalFree
GetLastError
GetSystemDirectoryW
GetComputerNameW
TerminateProcess
ExpandEnvironmentStringsW
LoadLibraryExA
GetModuleHandleA
VirtualAllocEx
VirtualProtectEx
GetProcAddress
VerifyVersionInfoW
FlushInstructionCache
GetModuleHandleW
SetEnvironmentVariableW
GetCurrentProcess
VerSetConditionMask
SetDllDirectoryW
GetEnvironmentVariableW
ReleaseActCtx
MultiByteToWideChar
CreateActCtxW
VirtualQuery
GetCommandLineW
HeapFree
EncodePointer
DecodePointer
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
LoadLibraryExW
ExitProcess
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetStartupInfoW
WriteFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
RtlUnwind
OutputDebugStringW
winmm
timeGetTime
advapi32
RegCloseKey
RegOpenKeyExW
RevertToSelf
RegDisablePredefinedCache
GetLengthSid
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
ConvertSidToStringSidW
LookupAccountNameW
Exports
Exports
?ProvideLogFunction@sandboxing@mozilla@@YAXP6AXPBD00_NI@Z@Z
?moz_Xinvalid_argument@std@@YAXPBD@Z
?moz_Xlength_error@std@@YAXPBD@Z
?moz_Xout_of_range@std@@YAXPBD@Z
?moz_Xoverflow_error@std@@YAXPBD@Z
?moz_Xruntime_error@std@@YAXPBD@Z
?mozalloc_abort@@YAXQBD@Z
?mozalloc_handle_oom@@YAXI@Z
?mozalloc_set_oom_abort_handler@@YAXP6AXI@Z@Z
IsSandboxedProcess
_TargetCreateNamedPipeW@36
_TargetCreateProcessA@44
_TargetCreateProcessW@44
_TargetGdiDllInitialize@12
_TargetGetStockObject@8
_TargetNtCreateEvent@24
_TargetNtCreateFile@48
_TargetNtCreateKey@32
_TargetNtMapViewOfSection@44
_TargetNtOpenEvent@16
_TargetNtOpenFile@28
_TargetNtOpenKey@16
_TargetNtOpenKeyEx@20
_TargetNtOpenProcess@20
_TargetNtOpenProcessToken@16
_TargetNtOpenProcessTokenEx@20
_TargetNtOpenThread@20
_TargetNtOpenThreadToken@20
_TargetNtOpenThreadTokenEx@24
_TargetNtQueryAttributesFile@12
_TargetNtQueryFullAttributesFile@12
_TargetNtSetInformationFile@24
_TargetNtSetInformationThread@20
_TargetNtUnmapViewOfSection@12
_TargetRegisterClassW@8
g_handles_to_close
g_interceptions
g_nt
g_originals
g_shared_IPC_size
g_shared_delayed_integrity_level
g_shared_delayed_mitigations
g_shared_policy_size
g_shared_section
moz_xcalloc
moz_xmalloc
moz_xrealloc
moz_xstrdup
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ