C:\projects\squirrel-windows\src\Setup\bin\Release\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_09d82ca659781420fd70924c5af794f3_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-26_09d82ca659781420fd70924c5af794f3_bkransomware.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-26_09d82ca659781420fd70924c5af794f3_bkransomware
-
Size
57.6MB
-
MD5
09d82ca659781420fd70924c5af794f3
-
SHA1
4f2b19b352b3b9ffa2b0e415a8360134b551ab74
-
SHA256
98ceacbfcf8a18115413de7ea8f3b5391e42b07905d075b585cc7f56fb2ae6c6
-
SHA512
bd1cdd8b054a66c04b8d2a695c6a9a3142bc360d152d2b4a58d7559077078b01f342f069b614787f1781239745e67da87e75cacf8f9825ec0f194ed56bfcdc88
-
SSDEEP
1572864:dEVpmjYRaXlGXmGkzXYOUank2caws5NgL:6mYRXmPzoOcfSXgL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-26_09d82ca659781420fd70924c5af794f3_bkransomware
Files
-
2024-07-26_09d82ca659781420fd70924c5af794f3_bkransomware.exe windows:5 windows x86 arch:x86
974d7b68a207c0a13751cbd743330ff1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
FreeResource
LoadResource
FindResourceW
SizeofResource
LockResource
CreateProcessW
GetCurrentThreadId
DecodePointer
RaiseException
LeaveCriticalSection
EnterCriticalSection
lstrcmpiW
LoadLibraryExW
LoadLibraryW
LCMapStringW
WriteConsoleW
SetStdHandle
GetCurrentProcess
GetModuleFileNameW
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
lstrlenW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
VerSetConditionMask
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapReAlloc
HeapSize
VerifyVersionInfoW
IsDebuggerPresent
OutputDebugStringW
IsProcessorFeaturePresent
HeapFree
HeapAlloc
EncodePointer
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
RtlUnwind
GetProcessHeap
user32
DestroyWindow
CharNextW
LoadStringW
ExitWindowsEx
GetActiveWindow
wsprintfW
MessageBoxW
advapi32
GetUserNameW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
GetTokenInformation
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoCreateInstance
oleaut32
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
urlmon
URLDownloadToFileW
comctl32
InitCommonControlsEx
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57.5MB - Virtual size: 57.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ