Static task
static1
Behavioral task
behavioral1
Sample
2024-06-26_cda0271a667280470a51dfbdb8af8f37_bkransomware.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-26_cda0271a667280470a51dfbdb8af8f37_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-26_cda0271a667280470a51dfbdb8af8f37_bkransomware
-
Size
6.7MB
-
MD5
cda0271a667280470a51dfbdb8af8f37
-
SHA1
f85cba35d128fc7ee169fc80efb833e1d0ae3db9
-
SHA256
beebdc9e8394b513ce90f4b4ebcd5a0098f8e8d9633924078d64e082cc01cbc7
-
SHA512
a5c2f2d38eb9af7e0fa3b17cb7f09c00c5c1f06a839f7da95493bb9b7be4afa4b67de787f570a4e7f1df510fa5d5fe0f325211b130896c292d258169db8e5b64
-
SSDEEP
98304:JPWjybPalIEyQSBADCAbiC/WJrzYh7Qd6WLEZz3T3xJxUsypu//T2ABP7JdACwU1:Yyb7u7iC/6XYJA6B1PxIu/bBVmP/jf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-26_cda0271a667280470a51dfbdb8af8f37_bkransomware
Files
-
2024-06-26_cda0271a667280470a51dfbdb8af8f37_bkransomware.exe windows:6 windows x86 arch:x86
c3131633869d4d83f4f0059a85e11819
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
SetFilePointerEx
GetConsoleMode
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetACP
IsValidCodePage
SetStdHandle
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
DeleteFileA
TlsFree
LocalFree
OpenFileMappingA
TlsAlloc
GetOEMCP
GlobalFree
ExitProcess
FindFirstFileA
GetOverlappedResult
CreateFileW
GetTimeZoneInformation
TerminateProcess
Beep
IsProcessorFeaturePresent
GetSystemTimeAdjustment
OpenProcess
TlsSetValue
SetCommTimeouts
SetCommState
GetWindowsDirectoryA
GetTickCount
WaitForSingleObjectEx
SetEnvironmentVariableW
InitializeSListHead
WaitNamedPipeA
SetEndOfFile
GetCPInfo
GetLocaleInfoA
GetDateFormatW
GetThreadTimes
SetLastError
CreateThread
DeleteCriticalSection
GetStringTypeW
GetModuleFileNameA
CreatePipe
ResetEvent
EnterCriticalSection
CreateNamedPipeA
IsDBCSLeadByteEx
FlushFileBuffers
CreateProcessA
GetFileAttributesA
CreateEventA
Sleep
IsValidLocale
WideCharToMultiByte
GetConsoleCP
GetProcessTimes
ClearCommBreak
GlobalLock
SetHandleInformation
GetModuleHandleExW
HeapFree
GetCurrentProcess
LoadLibraryExW
FreeLibrary
VirtualQuery
TlsGetValue
GetEnvironmentVariableW
IsDebuggerPresent
GetLastError
DecodePointer
EncodePointer
LeaveCriticalSection
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
WriteConsoleW
user32
TranslateMDISysAccel
GetMessageA
GetSystemMenu
SetTimer
MapDialogRect
CreateDialogParamA
GetMessageW
SendDlgItemMessageA
LoadStringA
LoadIconA
GetWindowInfo
CreateMenu
GetWindowTextLengthA
SetScrollRange
CreateIconIndirect
InflateRect
GetWindowPlacement
GetKeyboardLayout
SetWindowLongA
MessageBoxA
InvalidateRect
PeekMessageA
ReleaseDC
SetClassLongA
DrawStateW
DestroyCursor
ShowWindow
EnableScrollBar
AppendMenuA
CreateWindowExW
BeginDeferWindowPos
RegisterClassW
GetSystemMetrics
SendMessageW
UpdateWindow
GetCaretBlinkTime
DrawFrameControl
RegisterClassA
GetCapture
ShowOwnedPopups
EndPaint
SetCursor
DestroyAcceleratorTable
PostQuitMessage
IsIconic
KillTimer
RemovePropA
MessageBeep
DrawEdge
GetDoubleClickTime
GetDC
GetQueueStatus
DrawFocusRect
GetKeyboardState
GetWindowTextA
GetScrollInfo
GetWindowLongA
EnableMenuItem
GetDlgItem
SetWindowsHookExA
RedrawWindow
DestroyCaret
GetDesktopWindow
GetSysColor
IsDlgButtonChecked
IsWindow
PostMessageA
EndMenu
DestroyMenu
GetDlgItemTextA
ToUnicode
ValidateRect
gdi32
BitBlt
GetTextExtentPoint32A
SetViewportOrgEx
MaskBlt
GetDeviceCaps
StretchBlt
CreateFontIndirectA
CopyEnhMetaFileA
ExcludeClipRect
CreateBitmap
DeleteObject
Rectangle
RealizePalette
SetPolyFillMode
GetCurrentPositionEx
SelectPalette
CreateRectRgn
CreatePen
SetROP2
RectVisible
SetTextAlign
CloseEnhMetaFile
CreateEnhMetaFileW
RestoreDC
UpdateColors
GetTextExtentPointW
GetBitmapBits
MoveToEx
GetWindowOrgEx
SetWindowExtEx
GetMetaFileBitsEx
SetTextColor
GetCharacterPlacementW
GetRgnBox
GetEnhMetaFileHeader
CreatePalette
GetPaletteEntries
PolyPolyline
CombineRgn
SetMapMode
OffsetRgn
GetBkColor
SetStretchBltMode
GetSystemPaletteEntries
CreatePatternBrush
RoundRect
EndDoc
GetStockObject
CreateSolidBrush
SaveDC
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
RegOpenKeyExA
SetSecurityDescriptorDacl
RegQueryValueExW
RegCloseKey
GetLengthSid
RegOpenKeyExW
InitializeSecurityDescriptor
CopySid
OpenProcessToken
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 726KB - Virtual size: 726KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wwBE Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ