C:\Users\Koji\SkyDrive\ドキュメント\WORK\Visual Studio 2013\Projects\OyaziViewer\Release\OyaziViewer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_07354d6ef4297598bd04c89dd4209284_bkransomware.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-07_07354d6ef4297598bd04c89dd4209284_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_07354d6ef4297598bd04c89dd4209284_bkransomware
-
Size
1.5MB
-
MD5
07354d6ef4297598bd04c89dd4209284
-
SHA1
1ce9545310db3e19463f7e513dccd1cc62940d65
-
SHA256
45caa80c6f71e60a4b03bd63dcb2b0374cf826bfebbdf58a049c589224b5ac68
-
SHA512
7b92ac23dcc7eab99f6088289150a0939549ec4a360c2326548571f11bd692f90551370da0504ebbb5b7f1cfdae2464f8972af4837c24de3a7f15b352860df3a
-
SSDEEP
24576:mj2QSnsOOJb/cjKMXNYcGOQlRMNF3pKwGRRnwV+iKm7TvrpoOZ:wtJb/IcOIY3Ym7Tvt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-07_07354d6ef4297598bd04c89dd4209284_bkransomware
Files
-
2024-06-07_07354d6ef4297598bd04c89dd4209284_bkransomware.exe windows:5 windows x86 arch:x86
a564d0bb3c66df8b3844c5661081d15b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReleaseMutex
GetCommandLineW
MapViewOfFile
UnmapViewOfFile
GetFileAttributesW
GetPrivateProfileIntW
CreateFileMappingW
SetFilePointerEx
GetStringTypeExW
DosDateTimeToFileTime
CreateFileA
SetFileTime
GetFileTime
LocalFileTimeToFileTime
GetLocalTime
GetFullPathNameW
GetFullPathNameA
HeapReAlloc
HeapCompact
TryEnterCriticalSection
HeapAlloc
SystemTimeToFileTime
QueryPerformanceCounter
HeapFree
InterlockedCompareExchange
UnlockFile
FlushViewOfFile
LockFile
WaitForSingleObjectEx
OutputDebugStringW
GetTickCount
UnlockFileEx
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
InitializeCriticalSection
FormatMessageW
GetVersionExW
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
HeapValidate
FlushFileBuffers
HeapSize
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
DeleteCriticalSection
GetCurrentThreadId
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
GetTempPathA
LocalFree
GlobalFree
AreFileApisANSI
DeleteFileA
HeapSetInformation
GetProcAddress
GetLastError
OpenMutexW
ExpandEnvironmentStringsA
SetEnvironmentVariableA
LCMapStringW
CompareStringW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetConsoleCP
RtlUnwind
GetFileType
ReadConsoleW
GetConsoleMode
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStringTypeW
RaiseException
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
FindFirstFileW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExW
ExitThread
CreateThread
DecodePointer
EncodePointer
MoveFileExW
IsProcessorFeaturePresent
IsDebuggerPresent
GlobalUnlock
WritePrivateProfileStringW
MultiByteToWideChar
CreateFileW
ReadFile
Sleep
LoadLibraryW
WideCharToMultiByte
GlobalAlloc
WriteFile
GetPrivateProfileStringW
WaitForSingleObject
GlobalLock
FreeLibrary
SetEndOfFile
SetFilePointer
CreateMutexW
GetFileSize
SetFileAttributesW
lstrcpyW
DeleteFileW
CloseHandle
FindNextFileW
lstrcatW
lstrcmpiW
RemoveDirectoryW
SetCurrentDirectoryW
FindClose
GetCurrentDirectoryW
GetTempPathW
lstrlenW
lstrcmpW
CopyFileW
CreateDirectoryW
CreateProcessW
GetSystemTime
user32
SendDlgItemMessageW
EndPaint
PostQuitMessage
PostMessageW
GetSubMenu
RegisterClassW
CreateWindowExW
LoadIconW
IsDialogMessageW
DeleteMenu
GetMenuStringW
SendMessageW
LoadAcceleratorsW
CreateDialogParamW
ShowWindow
GetCursorPos
SetWindowLongW
GetDlgItem
GetWindowLongW
SetFocus
ScreenToClient
DestroyWindow
DispatchMessageW
PeekMessageW
MessageBoxA
TranslateMessage
WaitForInputIdle
SetClipboardData
EnableWindow
GetMessageW
TranslateAcceleratorW
MessageBoxW
GetClientRect
BeginPaint
EnumWindows
InsertMenuItemW
GetScrollInfo
InvalidateRect
LoadMenuW
GetClassNameW
EnableMenuItem
SetMenu
CreatePopupMenu
GetMenuItemCount
ScrollWindowEx
UpdateWindow
DestroyMenu
SetMenuItemInfoW
SetScrollInfo
DefWindowProcW
FillRect
GetWindowRect
IsIconic
IsZoomed
SetForegroundWindow
GetDC
BringWindowToTop
GetWindowTextW
ReleaseDC
SetWindowPos
SetWindowTextW
MessageBeep
GetDlgItemTextW
LoadCursorW
SendNotifyMessageW
CloseClipboard
DialogBoxParamW
EmptyClipboard
EndDialog
OpenClipboard
SetDlgItemTextW
GetSystemMetrics
gdi32
MoveToEx
SetTextColor
SetBkMode
SelectObject
ExtTextOutW
GetTextExtentExPointW
CreatePen
SetTextAlign
CreateSolidBrush
DeleteObject
CreateCompatibleDC
LineTo
SelectClipRgn
CreateFontIndirectW
PatBlt
GetTextExtentPoint32W
BitBlt
CreateRectRgn
SetBkColor
GetKerningPairsW
GetTextMetricsW
GetDeviceCaps
GetStockObject
DeleteDC
Rectangle
FillRgn
CreateCompatibleBitmap
CombineRgn
EnumFontFamiliesExW
CreateRectRgnIndirect
comdlg32
GetOpenFileNameW
GetSaveFileNameW
shell32
DragQueryFileW
DragFinish
DragAcceptFiles
comctl32
ord17
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageWidth
GdipCloneImage
GdipFillRectangleI
GdipCreateFromHDC
GdipDisposeImage
GdipAlloc
GdipCreateSolidFill
GdipLoadImageFromFile
GdipDrawImageRectI
GdipDeleteGraphics
GdipGetImageHeight
GdipCloneBrush
GdipFree
GdipDeleteBrush
shlwapi
PathFileExistsW
PathIsDirectoryW
PathCombineW
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 396KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ