Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_4acaa13ef37fff9ad8beabe915a23eb5_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-06_4acaa13ef37fff9ad8beabe915a23eb5_bkransomware.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-06_4acaa13ef37fff9ad8beabe915a23eb5_bkransomware
-
Size
518KB
-
MD5
4acaa13ef37fff9ad8beabe915a23eb5
-
SHA1
4c5f5fd44c698dbb2bb6633aadc5309ec7bccfd1
-
SHA256
bb6ebc64d72bea02e041d42c23918530760818b03f5fc67c5763e07ae6a124ed
-
SHA512
0138dee2837f7b6d45d9bab14399fc1b6ce78e5fafda5655834fa944b031c2fa0062d36702ba49a2897f67954bdb7467e2c7edd0558c261a50941476ea40195b
-
SSDEEP
6144:Lsvw2lEeYYQTkHXVN3rocPhR/QMlF1IR2o/DxKgFIzGO9TDKw468DbJ:LuldYZkHH3nQO8R20DxtIzJKT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-06_4acaa13ef37fff9ad8beabe915a23eb5_bkransomware
Files
-
2024-07-06_4acaa13ef37fff9ad8beabe915a23eb5_bkransomware.exe windows:5 windows x86 arch:x86
03f3034fcc165829ea74e2542787d493
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetGraphicsMode
GetNearestPaletteIndex
SetTextColor
GetMapMode
GetDCBrushColor
GetPixelFormat
GetFontUnicodeRanges
GetDCPenColor
SetTextAlign
GetClipRgn
SetSystemPaletteUse
SetTextJustification
UpdateColors
GetNearestColor
GetBkColor
GetObjectType
GetTextColor
SetPixel
user32
GetMenu
GetMenuContextHelpId
GetMenuState
EnableWindow
GetPropA
GetMenuCheckMarkDimensions
GetWindowLongA
SendMessageA
DrawTextA
GetDlgItem
EndDialog
GetMenuItemCount
GetForegroundWindow
GetWindowContextHelpId
BeginPaint
GetScrollPos
IsWindowUnicode
GetKeyboardType
SetWindowTextA
GetQueueStatus
GetWindowDC
PostMessageA
EndPaint
SetDlgItemTextA
RemovePropA
LoadIconA
ShowWindow
MoveWindow
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetProcAddress
GetModuleHandleA
GetCurrentThreadId
GetLastError
GlobalFlags
GlobalHandle
IsProcessorFeaturePresent
FindClose
GlobalSize
GetStdHandle
GetCurrentProcessId
GlobalAlloc
LockResource
SetFilePointer
SizeofResource
GetTickCount
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetProcessHeap
WriteFile
GetModuleFileNameW
IsDebuggerPresent
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetCurrentThread
GetConsoleCP
GetConsoleMode
CloseHandle
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
SetEnvironmentVariableA
Sections
.text Size: 452KB - Virtual size: 452KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE