Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_f137164135a4b4a505699577131ee0d7_bkransomware.exe
Resource
win7-20240215-en
General
-
Target
2024-05-26_f137164135a4b4a505699577131ee0d7_bkransomware
-
Size
6.7MB
-
MD5
f137164135a4b4a505699577131ee0d7
-
SHA1
460cb0acc3dd10c8fd39b4295d8e4481289a51aa
-
SHA256
a53fae51908ad0e8836a426d01a681bd19cd8b9230f96335117718a5cfd35a69
-
SHA512
1b48f9fe4a191c60ce1e024e12395ce965fd94a11449cb5f0450bd16afc423edd5a388b9b29835b4b55ba56b0e3d51e7096d0e46064db6edf56117e430cf8ae6
-
SSDEEP
196608:rQ4NmRfE0gpKO7fNi1ijolroesXiDCrQnrVKYx:BmRM0aKO7YNlroesXWcY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_f137164135a4b4a505699577131ee0d7_bkransomware
Files
-
2024-05-26_f137164135a4b4a505699577131ee0d7_bkransomware.exe windows:6 windows x86 arch:x86
840152e6fa2c41bebb0f4bde88bc13a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStringTypeW
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
Sleep
IsDebuggerPresent
GetCPInfoExW
SetThreadLocale
GetFileAttributesW
GetVersionExW
SizeofResource
EnumCalendarInfoW
SetFilePointer
FindFirstFileW
GetUserDefaultUILanguage
QueryDosDeviceW
GetExitCodeThread
GetPrivateProfileStringW
GetExitCodeProcess
SignalObjectAndWait
GetUserDefaultLCID
SystemTimeToFileTime
SetErrorMode
GetFileSize
ReleaseSemaphore
GetFullPathNameW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapAlloc
GetProcessHeap
IsValidCodePage
GetACP
CreateFileW
user32
PeekMessageA
GetMessageW
ShowWindow
CreateWindowExW
UpdateWindow
SetCursor
SetTimer
HideCaret
GetWindowRect
MapDialogRect
CharNextW
TrackPopupMenu
SetKeyboardState
GetMenuItemInfoW
SetScrollInfo
GetWindowLongA
GetWindowTextW
GetWindowPlacement
ScrollWindow
CheckDlgButton
SetMenu
SendMessageW
LoadCursorA
GetMessageA
LoadIconA
BeginPaint
WaitMessage
GetDC
SetPropA
CharUpperW
SetWindowLongW
GetDesktopWindow
GetKeyboardType
InsertMenuW
DialogBoxParamA
gdi32
BitBlt
GetTextExtentPoint32W
GetDeviceCaps
GetDIBits
SetDIBColorTable
GetPaletteEntries
GetTextExtentExPointA
SetTextAlign
EndDoc
EndPage
GetWindowOrgEx
GetTextExtentPoint32A
LineTo
SelectObject
SetMapMode
SaveDC
GetCurrentPositionEx
GetCharWidth32A
GetClipBox
RectVisible
CreateDIBitmap
TextOutA
ExtCreatePen
advapi32
GetLengthSid
RegConnectRegistryW
OpenServiceW
QueryServiceStatus
OpenSCManagerW
RegSetValueExW
shell32
ShellExecuteExW
ole32
CoInitialize
oleaut32
SafeArrayPtrOfIndex
VariantInit
SafeArrayGetLBound
Sections
.text Size: 705KB - Virtual size: 704KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ