Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_fd2c206ec409c1ea115d1201937e0542_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-06_fd2c206ec409c1ea115d1201937e0542_bkransomware.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-06_fd2c206ec409c1ea115d1201937e0542_bkransomware
-
Size
505KB
-
MD5
fd2c206ec409c1ea115d1201937e0542
-
SHA1
34c45c41f2614998d2296afb526a88b71291da1a
-
SHA256
590b120a787551204f4ca360f55d3df44ec80d6e825c919060ebac12f6516a23
-
SHA512
ad05b7a50b56c3f2a7341e6ef717672249bbf6c153692e22b68f40fbbc29d173c3927e1642382d7b8f9f71cea7ecdaec7f998526a3679683e7ab105afc1a2c45
-
SSDEEP
12288:6+5CVhXPwrrdDnW297nOMMgfwrqZ3fiH63VXzFB+04:6++hXPwPda2pzwrm3fz3Vxg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-06_fd2c206ec409c1ea115d1201937e0542_bkransomware
Files
-
2024-07-06_fd2c206ec409c1ea115d1201937e0542_bkransomware.exe windows:5 windows x86 arch:x86
3ba2e6ee1aba95487ecec5360e106c6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBkColor
GetMetaRgn
SetSystemPaletteUse
GetCurrentObject
GetSystemPaletteUse
GetTextCharacterExtra
GetDCBrushColor
SetTextJustification
GetFontUnicodeRanges
GetRandomRgn
SetTextCharacterExtra
GetPolyFillMode
GetTextCharsetInfo
SetTextAlign
UpdateColors
GetDeviceCaps
SetTextColor
GetFontLanguageInfo
SetPixel
GetGraphicsMode
GetDCPenColor
user32
GetWindowLongA
CheckDlgButton
EndPaint
DrawTextA
EnableWindow
WindowFromDC
GetWindowDC
RemovePropA
GetPropA
GetMenuCheckMarkDimensions
MoveWindow
GetDC
GetCursor
GetMenuContextHelpId
ShowWindow
EndDialog
SetWindowTextA
GetMenuState
GetMenu
GetForegroundWindow
GetDlgItem
GetDlgItemInt
GetMenuItemID
LoadIconA
PostMessageA
GetWindowContextHelpId
SetDlgItemTextA
SetFocus
BeginPaint
SendMessageA
GetScrollPos
IsWindowUnicode
CallWindowProcA
IsWindowEnabled
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
GetCurrentThread
GetProcAddress
GetModuleHandleA
GetTickCount
GetDriveTypeA
SetFilePointer
GetLastError
LocalFlags
GetCurrentProcessId
WriteFile
FindResourceA
GetCurrentProcess
GetCurrentThreadId
DeleteFileA
LockResource
GetFileType
GlobalFlags
GetStdHandle
SizeofResource
GetProcessHeap
GetVersion
GlobalSize
GlobalHandle
IsDebuggerPresent
CloseHandle
QueryPerformanceCounter
MoveFileA
LoadResource
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimeAsFileTime
HeapReAlloc
GetCommandLineA
IsProcessorFeaturePresent
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetEnvironmentVariableA
Sections
.text Size: 454KB - Virtual size: 453KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE