Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_5f214c299568b3c8368633cac67c2a4b_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-29_5f214c299568b3c8368633cac67c2a4b_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-29_5f214c299568b3c8368633cac67c2a4b_bkransomware
-
Size
501KB
-
MD5
5f214c299568b3c8368633cac67c2a4b
-
SHA1
4a681d79bccf2d92b3c47c8a4cd65a31fc54f29b
-
SHA256
cf94de5f26b8539cc9833d1aac64433103c957c063105b36b70806c85086e2b0
-
SHA512
2d811e80040b9878a4ab6c2b60ff6d5195cdb1dfbff34fce4495062ffadbd77252953635a619990841d9dc32d598d811b806de424d3efa10a2ab5d4487b02ae7
-
SSDEEP
6144:em6E1zg2juINtPYqVjptQKbGVZmzc0y1DCeJ753SGu2igxZJwhlA9GTv4GNuTd65:eIAEPTjptQZpR3SGu2olA4TvwZMO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-29_5f214c299568b3c8368633cac67c2a4b_bkransomware
Files
-
2024-06-29_5f214c299568b3c8368633cac67c2a4b_bkransomware.exe windows:5 windows x86 arch:x86
b4e84df6d1e205c35a5650ea5023448a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetPolyFillMode
GetPixelFormat
GetMetaRgn
GetRandomRgn
GetStretchBltMode
GetTextAlign
GetSystemPaletteUse
GetBkColor
GetFontUnicodeRanges
GetDCBrushColor
SetSystemPaletteUse
GetObjectType
SetTextAlign
GetGraphicsMode
GetTextCharacterExtra
SetTextJustification
GetTextColor
GetDCPenColor
SetTextCharacterExtra
GetTextCharset
GetFontLanguageInfo
user32
IsWindowEnabled
GetForegroundWindow
LoadIconA
MoveWindow
GetCursor
WindowFromDC
GetMenuState
GetMenuItemCount
BeginPaint
GetDC
GetKeyboardType
GetMenu
RemovePropA
SetFocus
IsWindowUnicode
GetDlgItemInt
ShowWindow
SetWindowTextA
CallWindowProcA
DrawTextA
EndDialog
GetMenuCheckMarkDimensions
PostMessageA
EnableWindow
GetMenuContextHelpId
SendMessageA
CheckDlgButton
GetPropA
EndPaint
GetDlgItem
GetWindowLongA
SetDlgItemTextA
GetScrollPos
GetWindowContextHelpId
GetWindowDC
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetCPInfo
GetOEMCP
GetACP
GetProcAddress
GetModuleHandleA
SetFilePointer
GetCurrentProcessId
GlobalSize
GetCurrentProcess
GetProcessHeap
GlobalFlags
WriteFile
GetLastError
MoveFileA
DeleteFileA
IsDebuggerPresent
GlobalHandle
GetDriveTypeA
LoadResource
LocalFlags
GetCurrentThreadId
GetVersion
QueryPerformanceCounter
FindClose
IsProcessorFeaturePresent
FlushFileBuffers
LockResource
GetFileType
GetTickCount
GlobalAlloc
GetStdHandle
CloseHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
SetEnvironmentVariableA
Sections
.text Size: 451KB - Virtual size: 451KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE