Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_2b218726b094f64d311ad42c9488a7c5_bkransomware.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-01_2b218726b094f64d311ad42c9488a7c5_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-01_2b218726b094f64d311ad42c9488a7c5_bkransomware
-
Size
6.7MB
-
MD5
2b218726b094f64d311ad42c9488a7c5
-
SHA1
b1c7d39ee69211da01bdfaa212f28a97a0905024
-
SHA256
51ae24ad36d12b8fa11a1d3fb67ec57ee1507245190721e934682163858e4096
-
SHA512
1e34d531d157db4beb09b86949e953aa94aa515b92605518811a65be02ebff3fbb1c5b00a9f83edad3dc9e14d8f8251d0bd0f38b86bb0ad10535795fa22a00a4
-
SSDEEP
196608:q8n8n1FelOu+jYLKnikOAZtV8Oe1CZPVbrOXrcpaJC:q8n8n1FelkjKdaV8tibaj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-01_2b218726b094f64d311ad42c9488a7c5_bkransomware
Files
-
2024-06-01_2b218726b094f64d311ad42c9488a7c5_bkransomware.exe windows:6 windows x86 arch:x86
bb5117ea63a368084ab38bd42f4b4336
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FlushFileBuffers
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
Sleep
SwitchToThread
lstrcpyW
ResumeThread
EnumResourceTypesW
VirtualAlloc
GetThreadLocale
GetPrivateProfileIntW
SetThreadPriority
FileTimeToSystemTime
HeapCreate
FormatMessageW
LoadLibraryW
GetLogicalDrives
VirtualQueryEx
SystemTimeToTzSpecificLocalTime
SignalObjectAndWait
GetDriveTypeW
GetFileSize
SuspendThread
WritePrivateProfileStringW
FreeLibraryAndExitThread
HeapDestroy
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
CreateFileW
user32
GetMessageW
ShowWindow
CreateWindowExW
SendMessageW
UpdateWindow
DestroyWindow
GetWindowRect
RegisterWindowMessageW
IsIconic
PostMessageW
GetKeyState
CharLowerBuffW
CreateMenu
SetFocus
GetCapture
GetWindowLongA
EnableMenuItem
GetDlgItem
SetWindowLongW
GetSysColor
RemoveMenu
IsZoomed
GetKeyboardType
CheckRadioButton
InsertMenuA
SetDlgItemTextW
GetCaretBlinkTime
SetScrollInfo
ShowOwnedPopups
GetDlgItemInt
SetWindowRgn
CharUpperBuffW
SendDlgItemMessageA
LoadIconA
GetDC
GetQueueStatus
SetWindowLongA
LoadMenuW
GetWindowLongW
ScrollWindow
GetDesktopWindow
SetMenu
SetWindowTextA
MapWindowPoints
GetDlgItemTextA
DialogBoxParamA
SetWindowTextW
GetMonitorInfoW
GetWindow
FlashWindow
gdi32
BitBlt
GetWindowOrgEx
GetTextExtentPoint32A
SetMapMode
CreateCompatibleBitmap
SaveDC
SelectPalette
SetPaletteEntries
CreatePen
GetPixel
RestoreDC
PatBlt
SetTextColor
SetBkColor
SetDIBColorTable
SetPixel
SelectObject
Rectangle
GetCurrentPositionEx
GetDIBColorTable
ExtCreatePen
comdlg32
GetOpenFileNameW
advapi32
RegEnumKeyExW
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegGetKeySecurity
RegLoadKeyW
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
VariantChangeType
Sections
.text Size: 710KB - Virtual size: 710KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ