Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_9bebeacb23582c6a80a2468ea517f30d_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_9bebeacb23582c6a80a2468ea517f30d_bkransomware.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-01_9bebeacb23582c6a80a2468ea517f30d_bkransomware
-
Size
6.7MB
-
MD5
9bebeacb23582c6a80a2468ea517f30d
-
SHA1
67b7173126117cd1c9869c50e97130feeb54c00b
-
SHA256
2671a70184927fcc4cf9ef04a2c06ed35b96c914eaef60115b6dcfa4d782d6b1
-
SHA512
00e93dd5ee5e062e3585637f6ff7f81caa08434e5151810e7cd34dc40171ab465affb28401b9d0bbb1f06d4604767a4535e0507110980c4b9a11aefecbc06b23
-
SSDEEP
196608:/gwqfUSG+nwsZ+zGDqhoygg35Oc74cZCzGK1tng0UuZ:/gtGiwsAGBfYO8kzXtLUuZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-01_9bebeacb23582c6a80a2468ea517f30d_bkransomware
Files
-
2024-06-01_9bebeacb23582c6a80a2468ea517f30d_bkransomware.exe windows:6 windows x86 arch:x86
876e7f2337696257fd8440a111a96145
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleMode
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
SetFilePointerEx
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
OutputDebugStringW
FreeEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
LoadLibraryW
SetStdHandle
WriteConsoleW
Sleep
CreateThread
DeleteFileA
MultiByteToWideChar
Beep
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
WaitForSingleObject
SetEnvironmentVariableW
UnmapViewOfFile
CreateFileA
GetThreadTimes
CreateEventW
GetStartupInfoW
GetACP
GetSystemDirectoryA
CreateProcessA
IsProcessorFeaturePresent
GetConsoleCP
WaitForSingleObjectEx
GetEnvironmentStringsW
SetHandleInformation
InitializeSListHead
SetDllDirectoryW
GetFileType
GetStdHandle
CloseHandle
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
HeapSize
HeapAlloc
GetProcessHeap
IsDebuggerPresent
IsValidCodePage
GetOEMCP
GetCPInfo
CreateFileW
user32
GetMessageW
ShowWindow
CreateWindowExW
SendMessageW
UpdateWindow
KillTimer
GetParent
GetWindowInfo
GetDoubleClickTime
DrawFocusRect
ShowCursor
SetWindowLongA
EnableMenuItem
GetDlgItem
GetSysColor
CreatePopupMenu
DrawMenuBar
EnableWindow
EndPaint
GetMessageA
MapDialogRect
DrawIconEx
RemovePropA
ShowCaret
GetDC
InflateRect
GetWindowTextA
UnregisterClassA
ScrollWindow
DefWindowProcA
RedrawWindow
GetDesktopWindow
CheckDlgButton
RegisterClassW
SetWindowTextA
CheckMenuItem
RegisterClassA
ToUnicode
gdi32
SetTextColor
GetCharacterPlacementW
CreateFontA
StretchBlt
CreateFontIndirectA
OffsetRgn
CreateBitmapIndirect
GetCharABCWidthsW
GetTextExtentPointA
GetPixel
ExtTextOutA
CloseEnhMetaFile
UpdateColors
SetWindowOrgEx
PolyPolygon
GetWindowOrgEx
GetMetaFileBitsEx
Polygon
GetPaletteEntries
CreateCompatibleDC
CreateCompatibleBitmap
ExtCreateRegion
RealizePalette
StretchDIBits
GetBkColor
CreatePolygonRgn
advapi32
LookupPrivilegeValueW
shell32
ShellExecuteExW
Sections
.text Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ