Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_622fefa56cdb386360fbb4879c321c68_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-26_622fefa56cdb386360fbb4879c321c68_bkransomware.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-26_622fefa56cdb386360fbb4879c321c68_bkransomware
-
Size
6.7MB
-
MD5
622fefa56cdb386360fbb4879c321c68
-
SHA1
754ab0fda595050b7de7236c09a013bb6ae9a1e5
-
SHA256
3d61c6b97377fb27042c61909765772aca66beb5868943069f8492b45085fe94
-
SHA512
21fa18762d48b77f0d7718d5b3480888d498004cd62ba12e9e625be55b0f2d2fbff84ee15cffb88f60d3c3f731e03d23f90419b894e228655e390a756e44d05b
-
SSDEEP
196608:xhbosN/ZIH20UwdgQLc5DO6Namp4U2u4CAUerDL/aYm:DNm2ZQ0a60i6NDTJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-26_622fefa56cdb386360fbb4879c321c68_bkransomware
Files
-
2024-07-26_622fefa56cdb386360fbb4879c321c68_bkransomware.exe windows:6 windows x86 arch:x86
ea64bea0b16e637c5180f2eabca69b78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeSListHead
QueryPerformanceCounter
HeapFree
CreateDirectoryW
SignalObjectAndWait
WaitForSingleObjectEx
GetCurrentThread
GetUserDefaultLangID
WideCharToMultiByte
LoadLibraryW
IsValidLocale
GetLocaleInfoW
Sleep
FormatMessageW
GetVersionExW
HeapDestroy
LeaveCriticalSection
HeapCreate
GetExitCodeProcess
IsProcessorFeaturePresent
GetFileAttributesW
FileTimeToSystemTime
GetModuleFileNameW
MultiByteToWideChar
SetThreadPriority
GlobalUnlock
RaiseException
GetPrivateProfileIntW
FindFirstFileA
GetLastError
VirtualAlloc
EnterCriticalSection
ResetEvent
LoadLibraryA
GetFileType
GetExitCodeThread
CreateEventW
DeviceIoControl
FindNextFileA
GetThreadPriority
GetModuleHandleA
IsDebuggerPresent
GetStringTypeW
VirtualProtect
GetUserDefaultUILanguage
TlsAlloc
GetOverlappedResult
DeleteFileW
GetThreadTimes
CompareFileTime
TlsFree
ResumeThread
lstrcpyW
CreateThread
SwitchToThread
ReadConsoleW
WriteConsoleW
SetStdHandle
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
FreeLibraryAndExitThread
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetStdHandle
GetOEMCP
GetProcessHeap
HeapSize
GetModuleHandleExW
GetUserDefaultLCID
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetEvent
CreateTimerQueue
HeapAlloc
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsSetValue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
HeapReAlloc
DecodePointer
GetCurrentThreadId
DuplicateHandle
CloseHandle
CreateFileW
GetTimeZoneInformation
TerminateProcess
MulDiv
CreateEventA
InitializeCriticalSectionAndSpinCount
GetCommandLineA
VirtualQueryEx
GetCurrentProcess
GetCommState
EnumCalendarInfoW
SetDllDirectoryW
LoadLibraryExW
LoadResource
GetSystemDefaultUILanguage
VirtualQuery
GetCPInfo
UnmapViewOfFile
TlsGetValue
EncodePointer
GetCommandLineW
GetFullPathNameW
SetLastError
SuspendThread
EnumSystemLocalesW
OpenFileMappingA
WinExec
DeleteCriticalSection
QueryDosDeviceW
RemoveDirectoryW
IsValidCodePage
GetCPInfoExW
SetThreadLocale
WritePrivateProfileStringW
FlushFileBuffers
GetACP
LocalFree
CompareStringW
GetSystemTimeAsFileTime
GetTickCount
ConnectNamedPipe
WaitForSingleObject
GetEnvironmentStringsW
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
FreeLibrary
SetErrorMode
SetEndOfFile
GetEnvironmentVariableW
FileTimeToLocalFileTime
ExitProcess
user32
BeginDeferWindowPos
GetMonitorInfoW
GetKeyState
CharNextW
GetMessageW
DestroyAcceleratorTable
EndPaint
CheckMenuItem
DrawIconEx
AttachThreadInput
CharLowerBuffW
DrawTextExW
EnumWindows
CreateIconIndirect
CheckMenuRadioItem
MessageBoxA
EnumChildWindows
ShowWindow
CreateWindowExW
GetDlgItemTextW
UpdateWindow
GetDlgCtrlID
SetWindowTextW
DestroyIcon
GetWindowThreadProcessId
CharUpperBuffW
IsIconic
PostMessageW
GetDC
DrawFocusRect
InflateRect
GetWindowLongW
MonitorFromWindow
SetWindowLongW
GetDesktopWindow
EnableScrollBar
GetMenuItemCount
MessageBoxW
SendMessageW
gdi32
ExtFloodFill
SetWindowExtEx
CreateHatchBrush
CreateFontIndirectW
PlayEnhMetaFile
CombineRgn
CreatePatternBrush
CloseEnhMetaFile
CreateEnhMetaFileW
SetViewportOrgEx
GetMetaFileBitsEx
SetTextColor
Polygon
StretchBlt
GetRgnBox
RectInRegion
GetTextExtentPointW
SetStretchBltMode
SetROP2
comdlg32
GetSaveFileNameW
advapi32
RegOpenKeyExA
RegQueryValueExW
OpenServiceW
RegCloseKey
ControlService
SetSecurityDescriptorOwner
RegConnectRegistryW
StartServiceW
LookupPrivilegeValueW
CloseServiceHandle
RegSetValueExW
RegUnLoadKeyW
SetSecurityDescriptorDacl
ole32
CoInitialize
oleaut32
VariantChangeType
SysReAllocStringLen
VariantInit
SafeArrayCreate
VariantClear
Sections
.text Size: 694KB - Virtual size: 693KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ