Static task
static1
Behavioral task
behavioral1
Sample
2024-07-03_e34fb4f4fc9599dd1d85e7d632663191_bkransomware_karagany.exe
Resource
win7-20231129-en
General
-
Target
2024-07-03_e34fb4f4fc9599dd1d85e7d632663191_bkransomware_karagany
-
Size
118KB
-
MD5
e34fb4f4fc9599dd1d85e7d632663191
-
SHA1
a44dee4d1f6c22e7ec0b1e4d663c7d4888401702
-
SHA256
d3405232001285ceca1de5dd31bc18b98cde270ebbf31597d1428a6747c1cbcc
-
SHA512
f8d5f44b72e4c4426833c98cc48bfb4045d34eb53e1b13c0da478ff4c1dafae6969994e43228d4a26ba313d2936b9bcc48fb0c3012f6eaeaf6c6ed77c8f3b923
-
SSDEEP
1536:PF+Y+b/DvnTIYe1Hz/bDkTlVMRXbIgiv10qGFDS57FRFc5nb4pYsWjcd0ftE0Vd8:9+aTDFBI/t5GGSU0fWGC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-03_e34fb4f4fc9599dd1d85e7d632663191_bkransomware_karagany
Files
-
2024-07-03_e34fb4f4fc9599dd1d85e7d632663191_bkransomware_karagany.exe windows:5 windows x86 arch:x86
de2e994f74b7da570c7e291ab3627e07
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetConsoleScreenBufferInfo
GetModuleHandleA
DeleteCriticalSection
WriteFile
CreateFileW
GetCurrentDirectoryW
lstrcatW
CloseHandle
ExitProcess
FindFirstFileW
lstrlenA
SetEndOfFile
MoveFileExW
SetFilePointerEx
GetComputerNameW
FindFirstFileExW
OutputDebugStringW
VirtualFree
GetDriveTypeA
CopyFileW
GetFileAttributesW
ReadFile
lstrcmpW
GetLastError
MoveFileW
FindClose
GetProcAddress
DeleteFileW
lstrcpyW
lstrcpyA
WriteConsoleOutputCharacterW
InitializeSListHead
SetConsoleScreenBufferSize
GetConsoleWindow
InterlockedPopEntrySList
SetLastError
CreateTimerQueueTimer
QueryDepthSList
DeleteTimerQueueTimer
InterlockedPushEntrySList
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
WideCharToMultiByte
GetModuleFileNameW
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStdHandle
lstrlenW
WriteConsoleW
LeaveCriticalSection
VirtualAlloc
Sleep
InitializeCriticalSection
SetEnvironmentVariableA
LoadLibraryExW
WriteConsoleOutputW
FindNextFileW
RtlUnwind
GetFileAttributesExW
IsDebuggerPresent
IsProcessorFeaturePresent
MultiByteToWideChar
GetCommandLineW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
EncodePointer
DecodePointer
HeapSize
GetModuleHandleExW
AreFileApisANSI
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
CompareStringW
LCMapStringW
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
SetStdHandle
user32
wsprintfW
MessageBoxW
GetWindowRect
advapi32
CryptAcquireContextW
CryptDecrypt
CryptImportKey
CryptReleaseContext
shell32
SHGetSpecialFolderPathW
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ