Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_a060022e05cd21ca4eef836e5bb7856a_bkransomware.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-29_a060022e05cd21ca4eef836e5bb7856a_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-29_a060022e05cd21ca4eef836e5bb7856a_bkransomware
-
Size
6.7MB
-
MD5
a060022e05cd21ca4eef836e5bb7856a
-
SHA1
02f0b2806ae88f7176bd12b0731ddd171c101059
-
SHA256
38e12d242599e2d47bc572ee41d863a82f30cb69cddfa17fb13a16a0c690bcec
-
SHA512
63890d9de8aacf0232da39215ed1e90370a62679af5f074225b89da12d40fbbfb34b1e81d669e44c458598c9bdcdddf26541b9e0d0163de52416f7e78d4af888
-
SSDEEP
98304:WmY4JN2V498gOotmbLmgrEdR6SRNaAk36HVZPYqDsOtiJmKEi+Fyc3BdOJs1xRe4:WmYtjoMWHRNbk36H7iBJn6c4uqR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-29_a060022e05cd21ca4eef836e5bb7856a_bkransomware
Files
-
2024-06-29_a060022e05cd21ca4eef836e5bb7856a_bkransomware.exe windows:6 windows x86 arch:x86
136e8aa61001d614a0cac2c491ed7803
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
WinExec
GetThreadTimes
LocalFree
GetDriveTypeW
ExpandEnvironmentStringsA
GlobalUnlock
ResumeThread
ExpandEnvironmentStringsW
GetCommandLineW
EncodePointer
GetTempFileNameW
GetLocaleInfoA
GetCPInfo
VirtualQuery
GetSystemDefaultUILanguage
SystemTimeToTzSpecificLocalTime
VerSetConditionMask
GetCommState
WaitNamedPipeA
SetEnvironmentVariableW
QueryPerformanceCounter
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
GetWindowsDirectoryA
ClearCommBreak
VirtualQueryEx
LoadLibraryW
Sleep
SizeofResource
FormatMessageW
GetFileAttributesA
LeaveCriticalSection
lstrcpynW
IsProcessorFeaturePresent
Beep
GetModuleFileNameW
GetSystemDirectoryA
CreateFileW
MultiByteToWideChar
WritePrivateProfileStringW
RaiseException
VerifyVersionInfoW
FindFirstFileA
GetCPInfoExW
IsDBCSLeadByteEx
VirtualAlloc
IsValidCodePage
FindClose
LoadLibraryA
CreateFileMappingA
LockResource
CreateEventW
CreatePipe
FindNextFileW
GetUserDefaultUILanguage
TlsAlloc
CloseHandle
EnumSystemLocalesW
SuspendThread
CreateThread
SwitchToThread
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetStdHandle
IsDebuggerPresent
GetProcessHeap
HeapAlloc
WriteConsoleW
HeapSize
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
GetThreadPriority
GetOEMCP
RemoveDirectoryW
GetExitCodeThread
GetFileType
ResetEvent
GlobalFree
GetThreadLocale
SetLastError
GetLastError
GetStartupInfoW
SetThreadPriority
GetACP
CreateProcessA
GetFileAttributesW
HeapCreate
GetExitCodeProcess
InitializeCriticalSectionAndSpinCount
GetVersionExW
WideCharToMultiByte
TlsSetValue
SetCommState
ConnectNamedPipe
WaitForSingleObject
HeapFree
GetCurrentProcess
LoadLibraryExW
FreeLibrary
MapViewOfFile
FindFirstFileW
GlobalMemoryStatus
GetDateFormatW
GetEnvironmentVariableW
FindNextFileA
GetFullPathNameW
CreateTimerQueueTimer
GetLogicalProcessorInformation
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
TlsFree
TlsGetValue
TerminateProcess
SetUnhandledExceptionFilter
DuplicateHandle
GetCurrentThread
GetCurrentThreadId
EnterCriticalSection
DecodePointer
HeapReAlloc
RtlUnwind
UnhandledExceptionFilter
user32
ToUnicode
SetWindowTextW
ClientToScreen
DestroyAcceleratorTable
CharUpperBuffW
GetMessageW
DrawIconEx
GetWindowInfo
GetMenuStringW
ModifyMenuW
CreateIconIndirect
MessageBoxA
DrawStateW
CharUpperW
SetWindowLongW
ShowWindow
EnableScrollBar
CreateWindowExW
BeginDeferWindowPos
GetDlgItemTextW
SendMessageW
UpdateWindow
DestroyMenu
GetMonitorInfoW
CheckMenuItem
CopyRect
DestroyCursor
GetSysColorBrush
SetDlgItemTextW
PostMessageW
GetSubMenu
EnumWindows
GetDC
InflateRect
CreateDialogIndirectParamA
GetMenu
GetWindowLongW
SystemParametersInfoW
SendDlgItemMessageW
GetDesktopWindow
GetMenuItemCount
InsertMenuW
ValidateRgn
MapWindowPoints
GetDlgCtrlID
LoadMenuW
gdi32
RectInRegion
StretchDIBits
GetCharABCWidthsW
SetViewportExtEx
CloseEnhMetaFile
CreateEnhMetaFileW
SetLayout
ExtFloodFill
SetWindowExtEx
CreateHatchBrush
PlayEnhMetaFile
ExtCreateRegion
GetObjectW
CreatePatternBrush
SetWinMetaFileBits
PolyPolygon
comdlg32
GetOpenFileNameW
advapi32
RegSetValueExW
RegCloseKey
RegEnumKeyExW
ControlService
RegConnectRegistryW
RegGetKeySecurity
SetSecurityDescriptorDacl
RegDeleteKeyA
OpenServiceW
OpenProcessToken
AdjustTokenPrivileges
StartServiceW
LookupPrivilegeValueW
CloseServiceHandle
RegUnLoadKeyW
shell32
CommandLineToArgvW
Shell_NotifyIconW
ExtractIconExW
ShellExecuteW
SHGetFileInfoW
ole32
CoTaskMemFree
oleaut32
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayGetLBound
SysReAllocStringLen
SysFreeString
VariantChangeType
VariantInit
Sections
.text Size: 728KB - Virtual size: 727KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aPU Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ