Static task
static1
Behavioral task
behavioral1
Sample
2024-06-30_1b744a9cce4cca887fed2e4f5a8a9dd8_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-30_1b744a9cce4cca887fed2e4f5a8a9dd8_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-30_1b744a9cce4cca887fed2e4f5a8a9dd8_bkransomware
-
Size
584KB
-
MD5
1b744a9cce4cca887fed2e4f5a8a9dd8
-
SHA1
1ff0b9616afd8a7a58bf72ebbe53c960b616561a
-
SHA256
57cf69c875ad590c83c19b88c473233d9acd56764319c05b90de48979117d0ad
-
SHA512
875370913d767e77e0e41c8804a29dff81defbee9cc2cf3f34275069a2b2666b3f84ce4ec0b66fdf1a9835a5272625c710ffef35d577a2430c990cc7fb73efca
-
SSDEEP
12288:fZF4+IhJxXH0dNSO0/CJnCzpDWZzg4Y4t00nv:z4+IhnXG8OyCpCFDezBY4n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-30_1b744a9cce4cca887fed2e4f5a8a9dd8_bkransomware
Files
-
2024-06-30_1b744a9cce4cca887fed2e4f5a8a9dd8_bkransomware.exe windows:5 windows x86 arch:x86
bad5f7dcdc28ba5a3e7a25057f02100b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
UpdateColors
SetTextColor
GetTextAlign
SetPixel
GetTextCharset
GetTextColor
GetBkColor
GetRandomRgn
SetTextCharacterExtra
GetObjectType
GetDeviceCaps
GetGraphicsMode
GetFontUnicodeRanges
GetMapMode
SetTextJustification
GetTextCharacterExtra
SetSystemPaletteUse
SetTextAlign
GetDCBrushColor
GetDCPenColor
GetClipRgn
GetMetaRgn
user32
SetWindowTextA
GetMenu
CheckDlgButton
GetInputState
GetDC
IsWindowUnicode
CallWindowProcA
GetWindowLongA
GetScrollPos
GetForegroundWindow
GetWindowDC
MoveWindow
GetDlgItem
SendMessageA
IsWindowEnabled
SetDlgItemTextA
GetDialogBaseUnits
BeginPaint
RemovePropA
WindowFromDC
ShowWindow
SetFocus
GetWindowContextHelpId
GetQueueStatus
EndPaint
GetMenuCheckMarkDimensions
GetDlgItemInt
EnableWindow
GetPropA
PostMessageA
GetMenuContextHelpId
DrawTextA
LoadIconA
kernel32
SetEndOfFile
SetEnvironmentVariableA
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
RaiseException
GetTimeZoneInformation
ReadConsoleW
GetExitCodeProcess
WaitForSingleObject
GetFullPathNameW
MoveFileExW
GetStringTypeW
DeleteFileW
SetFilePointerEx
GetCurrentProcessId
GetProcAddress
GetModuleHandleA
IsDebuggerPresent
FindClose
GetStdHandle
GetCurrentThreadId
GlobalHandle
GetProcessHeap
FlushFileBuffers
GetLastError
MoveFileA
GetCurrentProcess
QueryPerformanceCounter
GlobalFlags
GetTickCount
SetFilePointer
LocalFlags
GetFileType
GetVersion
FindResourceA
DeleteFileA
IsProcessorFeaturePresent
GlobalAlloc
GlobalSize
CloseHandle
GetDriveTypeA
LoadResource
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
DuplicateHandle
CreateProcessW
GetTempPathA
GetFullPathNameA
DeleteCriticalSection
CreateProcessA
ReadFile
GetCommandLineA
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileAttributesExW
CreatePipe
SetEnvironmentVariableW
Sections
.text Size: 520KB - Virtual size: 519KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE