Static task
static1
Behavioral task
behavioral1
Sample
2024-07-24_57b3dc30cfb6477bb21f981dddd0df25_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-24_57b3dc30cfb6477bb21f981dddd0df25_bkransomware.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-24_57b3dc30cfb6477bb21f981dddd0df25_bkransomware
-
Size
460KB
-
MD5
57b3dc30cfb6477bb21f981dddd0df25
-
SHA1
90c4128c57af75322742ccc932650f63b59af72a
-
SHA256
cb38112f35ee6043d101f2b1e23eabc98bc57c36522c5b4a95142888be9ee73c
-
SHA512
c3cc3177886390125c98e140fc398d874b3136a43ed0c19e783425621eedef934f41369f75357576883ade9f4a6aa66c19562ad12075398269bea09f44930018
-
SSDEEP
6144:GCMtb1u1bfMwuRodTCS9x/vpKc0FAVbiYF0A+sp1nFPWRHqfqgxVa0kwB3i24M3:Ytg/nVvpKc4q+ePWRHqJVRk6J3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-24_57b3dc30cfb6477bb21f981dddd0df25_bkransomware
Files
-
2024-07-24_57b3dc30cfb6477bb21f981dddd0df25_bkransomware.exe windows:5 windows x86 arch:x86
0f549abcd15db7461d6ae3d950440262
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextCharacterExtra
GetSystemPaletteUse
SetPixel
GetGraphicsMode
GetDCPenColor
GetTextCharacterExtra
GetTextAlign
GetPolyFillMode
GetStretchBltMode
GetClipRgn
GetTextColor
GetRandomRgn
SetTextJustification
user32
GetInputState
SetWindowTextA
ShowWindow
GetQueueStatus
GetKeyboardType
GetMenu
GetMenuItemID
SendMessageA
GetCursor
IsWindowUnicode
GetDlgItemInt
BeginPaint
CheckDlgButton
GetScrollPos
PostMessageA
GetWindowDC
IsWindowEnabled
WindowFromDC
GetMenuItemCount
MoveWindow
SetFocus
DrawTextA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetStdHandle
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetProcAddress
GetModuleHandleA
SizeofResource
GetCurrentProcessId
GetTickCount
GetLastError
GetCurrentThreadId
GlobalFlags
GetVersion
MoveFileA
DeleteFileA
GlobalHandle
FindResourceA
GlobalSize
CloseHandle
GetCurrentProcess
GetStdHandle
LockResource
IsDebuggerPresent
GetProcessHeap
GetDriveTypeA
LocalFlags
SetFilePointer
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
IsProcessorFeaturePresent
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetConsoleCP
GetConsoleMode
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetFilePointerEx
HeapSize
GetDateFormatW
SetEnvironmentVariableA
Sections
.text Size: 395KB - Virtual size: 395KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE