Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_f64d5f235616f5624ffffc005cea8502_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-06_f64d5f235616f5624ffffc005cea8502_bkransomware.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-06_f64d5f235616f5624ffffc005cea8502_bkransomware
-
Size
6.7MB
-
MD5
f64d5f235616f5624ffffc005cea8502
-
SHA1
01ee73066960fe7522cc78bc3d958c45e5c0bc7c
-
SHA256
5337ecc3e2e62b0b5ee022838303b43fd7989e91d0c1855d664f25e3c3e67de6
-
SHA512
0f916061bdcbd5ead12280f3e3292de0ccbe67b7f01b6a6b1ef43fb15ce52e78ceade81ddb46bab80b571ef882e8a5427621b714bd6570279af9ea695e2d49fd
-
SSDEEP
98304:rSu9E/ABhgAIvD/BRVYvra/QjRh+xNcB/heEMaZG5n0wOPVkcOLzYEckoemsdjDc:rJ9HPRIzL2vuWS42EqcbkPeCK4CwM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-06_f64d5f235616f5624ffffc005cea8502_bkransomware
Files
-
2024-07-06_f64d5f235616f5624ffffc005cea8502_bkransomware.exe windows:6 windows x86 arch:x86
0d870dab609875949b37c062b021176a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
GetModuleHandleExW
ExitProcess
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
TlsFree
TlsSetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
GetExitCodeThread
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
GetEnvironmentVariableW
WriteConsoleW
CreateThread
ExpandEnvironmentStringsW
DeleteFileA
EnumSystemLocalesW
LocalFree
OpenFileMappingA
FindNextFileW
CreatePipe
CreateFileMappingA
GetLocalTime
EnterCriticalSection
CreateNamedPipeA
SetLastError
IsDBCSLeadByteEx
FindFirstFileA
FlushFileBuffers
MultiByteToWideChar
CompareStringW
GetTimeZoneInformation
GetSystemDirectoryA
CreateProcessA
MulDiv
Beep
GetFileAttributesA
GetSystemTimeAdjustment
Sleep
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
OpenProcess
SetCommState
ExpandEnvironmentStringsA
GetTickCount
WaitForSingleObject
QueryPerformanceCounter
InitializeSListHead
FreeLibrary
GetCPInfo
GlobalMemoryStatus
GetDateFormatW
GetThreadTimes
DeleteCriticalSection
GetModuleHandleA
FindNextFileA
GetModuleFileNameA
CreateEventW
ResetEvent
FindClose
GetStartupInfoW
GetOverlappedResult
TerminateProcess
LeaveCriticalSection
IsValidLocale
ClearCommBreak
GetWindowsDirectoryA
GetCurrentThread
WaitForSingleObjectEx
ConnectNamedPipe
SetCommBreak
GetCurrentProcess
TlsGetValue
RegisterWaitForSingleObject
GetCurrentThreadId
DuplicateHandle
CloseHandle
CreateFileW
user32
ValidateRect
ToAsciiEx
SetWindowRgn
GetSystemMenu
CreateDialogParamA
GetMessageW
TrackPopupMenu
IsIconic
KillTimer
LoadIconA
MessageBeep
SetParent
SetFocus
DrawEdge
GetDoubleClickTime
GetQueueStatus
SetRect
SetWindowLongA
GetScrollInfo
MessageBoxA
UnionRect
GetWindowLongA
SystemParametersInfoW
ReleaseDC
EnableMenuItem
ScrollWindow
DefWindowProcA
RedrawWindow
DestroyCaret
ShowWindow
SetMenu
DrawMenuBar
EnableScrollBar
PostMessageA
RemoveMenu
CreateWindowExW
CheckRadioButton
ReleaseCapture
ScrollWindowEx
RegisterClassW
SetWindowTextA
SendMessageW
UpdateWindow
LoadCursorA
DestroyIcon
DrawFrameControl
CheckMenuItem
TranslateMDISysAccel
CopyRect
GetWindowThreadProcessId
IsRectEmpty
EndPaint
GetMessageA
SendDlgItemMessageA
SetKeyboardState
DrawIconEx
LoadStringA
DeleteMenu
GetWindowInfo
GetClientRect
CreateMenu
GetWindowTextLengthA
EnumWindows
SetScrollRange
GetDC
ShowCursor
InflateRect
CreateDialogIndirectParamA
SetClassLongA
EndDialog
DestroyCursor
GetDesktopWindow
AppendMenuA
CreateCaret
SystemParametersInfoA
BeginDeferWindowPos
EnableWindow
EndMenu
DestroyMenu
GetCaretBlinkTime
ToUnicode
gdi32
GetBitmapBits
SetWindowOrgEx
BitBlt
TranslateCharsetInfo
PatBlt
GetMetaFileBitsEx
DeleteDC
Polygon
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
GetPaletteEntries
PolyPolyline
CombineRgn
SetMapMode
Rectangle
CreateBrushIndirect
Ellipse
ExtCreateRegion
SetPolyFillMode
CreateBitmapIndirect
SetPaletteEntries
GetDIBColorTable
GetObjectW
GetCharWidth32A
GetTextExtentPointA
Polyline
RoundRect
SetWinMetaFileBits
CloseEnhMetaFile
UpdateColors
CreateSolidBrush
CreatePen
ExtCreatePen
CreatePolygonRgn
MoveToEx
SetLayout
GetWindowOrgEx
ExtFloodFill
SetTextColor
GetCharacterPlacementW
CreateHatchBrush
StretchBlt
GdiFlush
CreateHalftonePalette
GetRgnBox
CreatePalette
GetRegionData
GetNearestPaletteIndex
CreateRectRgn
GetCharABCWidthsFloatA
CreatePatternBrush
RectVisible
SetTextAlign
IntersectClipRect
GetPixel
GetStockObject
CreateEnhMetaFileW
RestoreDC
SetROP2
advapi32
GetLengthSid
GetUserNameA
AllocateAndInitializeSid
LookupPrivilegeValueW
InitializeSecurityDescriptor
CopySid
OpenProcessToken
SetSecurityDescriptorOwner
ole32
CoTaskMemFree
Sections
.text Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.EOdJ Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ