Static task
static1
Behavioral task
behavioral1
Sample
2024-07-08_ee3334bfc02744ea721a642b62d7277c_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-08_ee3334bfc02744ea721a642b62d7277c_bkransomware.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-08_ee3334bfc02744ea721a642b62d7277c_bkransomware
-
Size
632KB
-
MD5
ee3334bfc02744ea721a642b62d7277c
-
SHA1
ee0e05032e02734f2d3e4be3b037c7e5f080f8a8
-
SHA256
c983a6019d81d3182cfef12eed44a6976db70cff79f57cec64aaf857d26019ba
-
SHA512
7677370c072c831ea107740fe4ba99918dc24f3063d13ca68fdd70db91990d5d63dce6083d959877dc900124fadd01795b07afe6a39de46ea9ac49d72464b271
-
SSDEEP
12288:bHElnct/PI5F1GbSNmxtalUXUGEUU/KE3vcqWgT7s1aYGGsHL:4ln0PIZVN2glUXUGe/p3ppECGU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-08_ee3334bfc02744ea721a642b62d7277c_bkransomware
Files
-
2024-07-08_ee3334bfc02744ea721a642b62d7277c_bkransomware.exe windows:5 windows x86 arch:x86
815c3931635e57092c026a7a88fcafbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetTempPathW
GetLocalTime
GetCommandLineA
IsProcessorFeaturePresent
GetProcessHeap
GetStdHandle
WriteFile
GetModuleFileNameW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
SetLastError
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameA
GetFileType
GetFullPathNameW
GetFileAttributesExW
SetFilePointerEx
RaiseException
GetStringTypeW
GetCurrentProcessId
SetStdHandle
GetTimeZoneInformation
FlushFileBuffers
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
WriteConsoleW
HeapSize
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
ReadFile
ReadConsoleW
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
Sections
.text Size: 501KB - Virtual size: 500KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ