Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_cf3a6c13edcd9fb6fe49ef7d086233ab_bkransomware.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-20_cf3a6c13edcd9fb6fe49ef7d086233ab_bkransomware.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-20_cf3a6c13edcd9fb6fe49ef7d086233ab_bkransomware
-
Size
563KB
-
MD5
cf3a6c13edcd9fb6fe49ef7d086233ab
-
SHA1
f991a285dd55aadc5b7e285a92edef3d863fe7f8
-
SHA256
b8fd34e6e22d8735e315ba7951c0f66483f764000482717e31b7aba71e4cf50d
-
SHA512
414b5a07b22d44457e8323826fd4f6eeaee926aaf5b9c696dcf2de501420e78e7051664310f2397ad295657806189c7c77f766e8a6adc225a185de787e55f849
-
SSDEEP
12288:ooJMva6voAH3Z9JiXb8/XWEjbpGRgv2kLs9JDBgDC+lHImc:oowa0oAJHiXA/WEjbpGeu4s9JODRX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-20_cf3a6c13edcd9fb6fe49ef7d086233ab_bkransomware
Files
-
2024-06-20_cf3a6c13edcd9fb6fe49ef7d086233ab_bkransomware.exe windows:5 windows x86 arch:x86
ed33369c10aab6aeb3e02c0e328adb4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetNearestColor
GetTextCharacterExtra
GetNearestPaletteIndex
GetTextAlign
GetSystemPaletteUse
GetTextColor
GetFontLanguageInfo
GetTextCharset
SetSystemPaletteUse
GetTextCharsetInfo
GetStretchBltMode
GetMapMode
GetPixelFormat
SetTextColor
GetFontUnicodeRanges
GetMetaRgn
GetCurrentObject
GetBkColor
SetTextAlign
UpdateColors
SetTextCharacterExtra
SetTextJustification
user32
GetForegroundWindow
EndDialog
GetDialogBaseUnits
LoadIconA
GetWindowContextHelpId
GetMenuState
GetMenuCheckMarkDimensions
EndPaint
GetWindowLongA
GetDlgItem
GetMenuItemCount
GetInputState
ShowWindow
RemovePropA
SetWindowTextA
IsWindowEnabled
IsWindowUnicode
GetDC
GetScrollPos
PostMessageA
GetKeyboardType
SetDlgItemTextA
WindowFromDC
GetMenuItemID
GetMenu
GetDlgItemInt
DrawTextA
BeginPaint
GetPropA
GetQueueStatus
SendMessageA
SetFocus
EnableWindow
kernel32
SetEnvironmentVariableA
SetEndOfFile
SetEnvironmentVariableW
GetExitCodeProcess
WaitForSingleObject
ReadConsoleW
WriteConsoleW
SetStdHandle
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
GetModuleFileNameA
SetFilePointerEx
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeW
CreateProcessA
GetFileAttributesExW
CreatePipe
GetModuleHandleA
GetProcAddress
IsDebuggerPresent
GetTickCount
GetCurrentThreadId
GetProcessHeap
GlobalAlloc
GetLastError
FlushFileBuffers
GetCurrentProcessId
GetVersion
WriteFile
CloseHandle
GetDriveTypeA
IsProcessorFeaturePresent
GlobalHandle
DeleteFileA
GetCurrentProcess
SetFilePointer
LockResource
LoadResource
GlobalSize
LocalFlags
QueryPerformanceCounter
GlobalFlags
GetFileTime
GetFileType
GetStdHandle
MoveFileA
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetLocalTime
GetTempPathA
DuplicateHandle
CreateProcessW
HeapReAlloc
GetCommandLineA
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetCurrentThread
GetConsoleCP
GetConsoleMode
RaiseException
GetFullPathNameA
Sections
.text Size: 505KB - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE