Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_ebdb66f1e201d5d4ba4c482c60657105_bkransomware.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-20_ebdb66f1e201d5d4ba4c482c60657105_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-20_ebdb66f1e201d5d4ba4c482c60657105_bkransomware
-
Size
560KB
-
MD5
ebdb66f1e201d5d4ba4c482c60657105
-
SHA1
e5400ce03c42c5292d01e653d4b05927ecaf49d9
-
SHA256
52cb79eca35ccb128659e0d9bc8dada434b1659461871282b21b2414677d403f
-
SHA512
98b3b2f0c935d94338c3c4989b58761c7ccb6c1a16ef7b062fd09c627f7daa82dacd2b6c711656a44e323c2c0640a95e7101f5143991f35439af55616599df66
-
SSDEEP
12288:zpWGWJCMlVQzZu0pa3Vh2Qhq5cf0K41/8bwu8udYWY:tWjr7Cpg+xt8E7u6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-20_ebdb66f1e201d5d4ba4c482c60657105_bkransomware
Files
-
2024-06-20_ebdb66f1e201d5d4ba4c482c60657105_bkransomware.exe windows:5 windows x86 arch:x86
7546c3d9912ca6d5cd805c9206cbf3b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetSystemPaletteUse
SetPixel
GetTextCharset
GetPolyFillMode
GetDeviceCaps
GetFontLanguageInfo
UpdateColors
GetSystemPaletteUse
GetFontUnicodeRanges
GetClipRgn
GetPixelFormat
SetTextCharacterExtra
GetBkColor
user32
GetDialogBaseUnits
GetMenuState
LoadIconA
GetMenu
GetMenuItemID
RemovePropA
GetKeyboardType
DrawTextA
GetMenuContextHelpId
GetWindowContextHelpId
GetScrollPos
SendMessageA
GetForegroundWindow
GetPropA
PostMessageA
IsWindowUnicode
IsWindowEnabled
SetFocus
GetMenuCheckMarkDimensions
SetDlgItemTextA
MoveWindow
ShowWindow
EndDialog
GetMenuItemCount
GetWindowLongA
GetDlgItem
CallWindowProcA
GetCursor
GetQueueStatus
GetDC
EnableWindow
GetInputState
CheckDlgButton
BeginPaint
EndPaint
GetDlgItemInt
GetWindowDC
SetWindowTextA
WindowFromDC
kernel32
SetEndOfFile
GetFullPathNameA
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
SetEnvironmentVariableW
ReadConsoleW
ReadFile
WriteConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
FlushFileBuffers
SetFilePointerEx
GetFileAttributesExW
GetFullPathNameW
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
RaiseException
GetStringTypeW
CloseHandle
GetConsoleMode
GetProcAddress
GetCurrentThreadId
IsDebuggerPresent
GetFileType
GetModuleHandleA
LocalFlags
GlobalHandle
DeleteFileA
GetLastError
IsProcessorFeaturePresent
GetCurrentProcess
GetCurrentProcessId
GlobalFlags
WriteFile
GetVersion
FindResourceA
GlobalSize
GetStdHandle
QueryPerformanceCounter
LockResource
SetFilePointer
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
Beep
Sleep
GetCommandLineA
GetProcessHeap
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetConsoleCP
SetEnvironmentVariableA
Sections
.text Size: 490KB - Virtual size: 489KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE