Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_dec79ad10cd2b9ae2a7a897fa1e10257_bkransomware.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-24_dec79ad10cd2b9ae2a7a897fa1e10257_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_dec79ad10cd2b9ae2a7a897fa1e10257_bkransomware
-
Size
798KB
-
MD5
dec79ad10cd2b9ae2a7a897fa1e10257
-
SHA1
8d20f6b822390bd15a026c91080d54b1776f2f5a
-
SHA256
56482721f95091f54a996abf847c94732a93a8ba9965a21efdf1cc4bb06c1ede
-
SHA512
2f042bc2ec0821915312caf758227d25156ed7e84fd432f2ecc48feb62e2927a3fe53012f95cc93654dfb892b124953c02bba1ebd4b1a1ee6e2db6e27ec3628f
-
SSDEEP
24576:W32WOoPjTA63fBkRrwmEotXIIcahtAkTjpJN+ipb:M2W5w63fBy7n7b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_dec79ad10cd2b9ae2a7a897fa1e10257_bkransomware
Files
-
2024-05-24_dec79ad10cd2b9ae2a7a897fa1e10257_bkransomware.exe windows:5 windows x86 arch:x86
839af098c1b1734f1985be6f69e21f5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
InternetCanonicalizeUrlW
HttpOpenRequestW
InternetOpenW
InternetConnectW
kernel32
GetFileSize
GetFullPathNameW
GetVolumeInformationW
LockFile
SetEndOfFile
SetFilePointer
UnlockFile
DuplicateHandle
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExW
GetFileSizeEx
GetFileTime
CreateThread
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
GetModuleHandleExW
FlushFileBuffers
HeapQueryInformation
VirtualAlloc
VirtualProtect
VirtualQuery
GetStdHandle
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetOEMCP
GetCPInfo
GetStringTypeW
GetTimeZoneInformation
OutputDebugStringW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleCP
SetFilePointerEx
SetStdHandle
WriteConsoleW
SetEnvironmentVariableA
FindFirstFileW
FindClose
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
CompareStringW
GlobalFlags
FormatMessageW
MulDiv
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
lstrcmpA
GlobalAlloc
GetThreadLocale
GlobalFindAtomW
GlobalAddAtomW
lstrcmpW
GlobalDeleteAtom
LoadLibraryExW
FreeLibrary
GetSystemDirectoryW
GetCurrentThreadId
EncodePointer
GlobalFree
GlobalUnlock
GlobalLock
FreeResource
LoadLibraryA
GetModuleHandleA
SetLastError
OutputDebugStringA
GetACP
GetTickCount
GetLongPathNameW
GetTempPathW
GetSystemInfo
LocalAlloc
GetVersionExW
GetLocaleInfoW
GetCurrentThread
GetCurrentProcess
GetComputerNameA
WideCharToMultiByte
GetSystemTimeAsFileTime
CreateProcessW
GetProcAddress
GetFileAttributesW
LoadLibraryW
CreateDirectoryExW
DeviceIoControl
MultiByteToWideChar
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteFileW
ReadFile
LocalFree
GetModuleFileNameW
GetCommandLineW
CloseHandle
WaitForMultipleObjects
LockResource
ExitThread
CreateFileW
SizeofResource
WriteFile
WaitForSingleObject
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
ExitProcess
DeleteCriticalSection
DecodePointer
HeapSize
GetLastError
RaiseException
Sleep
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
AreFileApisANSI
user32
RegisterClipboardFormatW
PostThreadMessageW
DestroyMenu
GetSysColorBrush
RealChildWindowFromPoint
WindowFromPoint
ClientToScreen
EndPaint
BeginPaint
GetWindowDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
GetCursorPos
TranslateMessage
GetMessageW
MapDialogRect
SetWindowContextHelpId
GetWindowThreadProcessId
PostQuitMessage
OffsetRect
CharNextW
IsDialogMessageW
IsDlgButtonChecked
MoveWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetWindow
GetLastActivePopup
GetTopWindow
MessageBeep
GetClassLongW
PtInRect
EqualRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
RedrawWindow
ValidateRect
SetForegroundWindow
GetForegroundWindow
UpdateWindow
GetMenuItemCount
GetMenuItemID
GetSubMenu
SetMenu
GetMenu
GetCapture
GetKeyState
GetDlgCtrlID
IsWindowVisible
IsChild
GetClassInfoExW
GetClassInfoW
RegisterClassW
DefWindowProcW
GetMessageTime
GetMessagePos
PeekMessageW
DispatchMessageW
GetDesktopWindow
SetActiveWindow
GetActiveWindow
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
DestroyWindow
RegisterWindowMessageW
IsWindowEnabled
SetFocus
IsWindow
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
GetNextDlgGroupItem
CharUpperW
KillTimer
SetTimer
IsRectEmpty
CheckMenuItem
GetFocus
IntersectRect
SetRect
InvalidateRgn
InvalidateRect
CopyAcceleratorTableW
ReleaseCapture
GetClassNameW
SetCapture
SendDlgItemMessageA
SetCursor
RemovePropW
LoadCursorW
LoadIconW
GetWindowRect
GetClientRect
PostMessageW
SetPropW
GetWindowLongW
SetWindowLongW
SetWindowPos
ShowWindow
CreateWindowExW
MessageBoxW
GetPropW
CallWindowProcW
GetDC
SystemParametersInfoW
ReleaseDC
GetSystemMetrics
wsprintfW
GetWindowTextW
GetDlgItem
SetWindowTextW
SendMessageW
UnregisterClassW
GetParent
EnableWindow
gdi32
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
CreateRectRgnIndirect
GetRgnBox
GetMapMode
SetMapMode
SetBkColor
CreateBitmap
SetTextColor
GetStockObject
GetObjectW
GetTextExtentPoint32W
GetTextMetricsW
CreateFontIndirectW
DeleteObject
ScaleWindowExtEx
SelectObject
ExtSelectClipRgn
SaveDC
RestoreDC
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetClipBox
Escape
DeleteDC
GetTextColor
GetDeviceCaps
GetBkColor
comdlg32
GetSaveFileNameW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegSetValueExW
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegDeleteValueW
RegCreateKeyExW
GetUserNameA
GetTokenInformation
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegOpenCurrentUser
RegDeleteKeyW
RegQueryInfoKeyW
RegQueryValueExW
CheckTokenMembership
FreeSid
shell32
SHCreateDirectoryExW
ShellExecuteExW
CommandLineToArgvW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathIsUNCW
PathFileExistsW
PathStripToRootW
ole32
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateGuid
CoTaskMemFree
CoInitializeEx
CoInitializeSecurity
CoInitialize
CoUninitialize
CoCreateInstance
CoFreeUnusedLibraries
OleInitialize
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemAlloc
CreateILockBytesOnHGlobal
OleUninitialize
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
oleaut32
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
SysAllocString
OleCreateFontIndirect
VariantChangeType
VariantClear
VariantInit
SysAllocStringLen
VariantCopy
SysFreeString
oledlg
OleUIBusyW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 517KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ