Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_81d252a3b14750ceed4077e63b42d687_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-05_81d252a3b14750ceed4077e63b42d687_bkransomware.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-05_81d252a3b14750ceed4077e63b42d687_bkransomware
-
Size
6.7MB
-
MD5
81d252a3b14750ceed4077e63b42d687
-
SHA1
48214263629231aced7e952022bad46430f1e13f
-
SHA256
72942e96da1b59e6cee83b66bfbc1e811ed4846a91d3b0b5945cb229ed153eb0
-
SHA512
2d9b8017e923b36851dd0753f6cb4660a50bb4112f9fb744e46dd28746dd0a287a5c457d4aff92404dee30f79de74fbbe8418cba1bfbbac32e4615877a1bfbc7
-
SSDEEP
196608:8EECHFZe+pOvXUK16+C4cqTf7x0jUUDDhbCxl:xvgxm4rDx0jfbk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-05_81d252a3b14750ceed4077e63b42d687_bkransomware
Files
-
2024-07-05_81d252a3b14750ceed4077e63b42d687_bkransomware.exe windows:6 windows x86 arch:x86
99e876106d3a5bc530c2a03415d47517
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
DecodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
CloseHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
SwitchToThread
DeleteFileW
FindResourceW
GetVersion
WinExec
GetThreadPriority
GetSystemInfo
DeviceIoControl
QueryDosDeviceW
LockResource
GetCPInfoExW
SetThreadLocale
WritePrivateProfileStringW
SetThreadPriority
FileTimeToSystemTime
lstrcpynW
HeapCreate
GetVersionExW
ReadProcessMemory
Sleep
GetSystemDirectoryW
GetUserDefaultLangID
GetPrivateProfileStringW
GetLogicalDrives
EnumCalendarInfoW
SetErrorMode
GetDriveTypeW
SetFilePointer
GetFileSize
EnumResourceNamesW
GetTempFileNameW
EncodePointer
FindFirstFileW
EnumResourceTypesW
GetDiskFreeSpaceW
VirtualAlloc
GetThreadLocale
GetLastError
GetPrivateProfileIntW
ExitThread
GetExitCodeProcess
HeapDestroy
SizeofResource
SignalObjectAndWait
GetUserDefaultLCID
CreateDirectoryW
CompareFileTime
VerSetConditionMask
LoadResource
SetThreadAffinityMask
CreateFileW
user32
GetSystemMenu
GetDlgItemInt
SetMenuItemInfoW
SetWindowTextW
ShowOwnedPopups
GetMessageA
DestroyWindow
CharUpperBuffW
MapDialogRect
GetMessageW
SendDlgItemMessageA
CharNextW
TrackPopupMenu
RegisterWindowMessageW
IsIconic
KillTimer
GetKeyState
DeleteMenu
GetParent
AttachThreadInput
LoadIconA
RemovePropA
SetParent
GetClientRect
CreateMenu
GetWindowTextLengthA
ModifyMenuW
WaitMessage
GetCapture
ShowCursor
GetKeyboardState
OffsetRect
SetPropA
SetWindowLongA
GetScrollInfo
MessageBoxA
InvalidateRect
LoadMenuW
GetWindowLongW
GetWindowLongA
GetWindowTextW
MonitorFromWindow
ScrollWindow
DefWindowProcA
SendDlgItemMessageW
CheckDlgButton
ShowWindow
SetMenu
CreatePopupMenu
GetSysColorBrush
GetMenuItemCount
CreateWindowExW
CheckRadioButton
InsertMenuW
ScrollWindowEx
GetSystemMetrics
SetCaretPos
SetWindowTextA
GetDlgItemTextW
SetDlgItemTextW
SendMessageW
UpdateWindow
EnableWindow
LoadCursorA
GetDlgItemTextA
DialogBoxParamA
GetCaretBlinkTime
SetDlgItemTextA
SetScrollInfo
ValidateRect
GetMonitorInfoW
CheckMenuItem
TranslateMDISysAccel
GetMessageTime
GetWindow
HideCaret
ToAsciiEx
EndPaint
SetTimer
GetWindowRect
CreateDialogParamA
PostQuitMessage
SetKeyboardState
IsZoomed
CharLowerBuffW
BeginPaint
GetDC
GetQueueStatus
GetMenu
GetWindowPlacement
GetWindowTextA
UnionRect
UnregisterClassA
SetScrollPos
PeekMessageA
GetClassNameW
SetWindowLongW
RedrawWindow
DestroyCaret
GetDesktopWindow
GetSysColor
EnumChildWindows
PostMessageA
GetKeyboardType
ReleaseCapture
RegisterClassW
InsertMenuA
GetDlgCtrlID
gdi32
MaskBlt
DeleteDC
CreateHalftonePalette
CreatePalette
CreateBitmap
SelectClipRgn
CreateRectRgnIndirect
SetMapMode
CreateCompatibleBitmap
RealizePalette
SetPaletteEntries
GetTextExtentExPointA
CreateRectRgn
TranslateCharsetInfo
GetTextExtentPointA
Polyline
CreatePen
RectVisible
RoundRect
SetTextColor
GetStockObject
RestoreDC
LineTo
SetDIBColorTable
GetClipBox
ExtCreatePen
MoveToEx
EndPage
CreateFontIndirectW
CreateFontIndirectA
SetBkColor
SetPixel
PolyPolyline
Rectangle
GetPixel
CreateSolidBrush
TextOutA
BitBlt
PatBlt
SetTextAlign
GetTextExtentPoint32W
GetCharWidth32A
CopyEnhMetaFileA
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
ChangeServiceConfigW
RegConnectRegistryW
RegGetKeySecurity
RegQueryInfoKeyW
EqualSid
CopySid
CloseServiceHandle
OpenSCManagerW
RegUnLoadKeyW
RegSetValueExW
RegLoadKeyW
AllocateAndInitializeSid
shell32
ShellExecuteW
ExtractIconExW
ole32
CoInitialize
oleaut32
VariantChangeType
Sections
.text Size: 732KB - Virtual size: 731KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wgJSG Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ