Static task
static1
Behavioral task
behavioral1
Sample
2024-08-02_aed93adf9d68ec66d1c079c6f9da518f_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-02_aed93adf9d68ec66d1c079c6f9da518f_bkransomware.exe
Resource
win10v2004-20240730-en
General
-
Target
2024-08-02_aed93adf9d68ec66d1c079c6f9da518f_bkransomware
-
Size
547KB
-
MD5
aed93adf9d68ec66d1c079c6f9da518f
-
SHA1
7e09da6bb7d03f0d47010ed314e092818116a398
-
SHA256
adc4a616b027ccafe14a7f9767fdf16176dce8813d0959abff10f98e4c4f0dc7
-
SHA512
219a8ce799b9074f887ff32501a780faf5145b079bf652f29b2435a0d28686e301212c9cda06f66b838406c7449390a8e8313f27e3affd9e516ddd91e454bc3b
-
SSDEEP
12288:dJT3FJ4E6/dZrY1WjktlUrrhJ3Tgw5IF7RO:/TVJhydZlTrrnjgSS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-02_aed93adf9d68ec66d1c079c6f9da518f_bkransomware
Files
-
2024-08-02_aed93adf9d68ec66d1c079c6f9da518f_bkransomware.exe windows:5 windows x86 arch:x86
916d021ad5c6976fae565d98026d7936
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
GetTextCharacterExtra
SetPixel
SetSystemPaletteUse
SetTextJustification
GetGraphicsMode
GetBkColor
SetTextCharacterExtra
GetTextAlign
SetTextAlign
GetNearestPaletteIndex
UpdateColors
GetDCBrushColor
GetTextColor
GetPolyFillMode
GetMapMode
GetFontLanguageInfo
GetClipRgn
GetMetaRgn
GetFontUnicodeRanges
GetTextCharset
GetObjectType
GetCurrentObject
GetNearestColor
GetDeviceCaps
GetPixelFormat
GetTextCharsetInfo
GetRandomRgn
GetStretchBltMode
user32
GetInputState
GetDlgItemInt
BeginPaint
PostMessageA
GetCursor
GetMenuCheckMarkDimensions
CheckDlgButton
SetWindowTextA
GetWindowDC
ShowWindow
SetDlgItemTextA
CallWindowProcA
RemovePropA
DrawTextA
GetMenu
SendMessageA
LoadIconA
GetWindowContextHelpId
GetMenuItemID
MoveWindow
GetMenuContextHelpId
GetDlgItem
GetWindowLongA
EnableWindow
EndDialog
EndPaint
GetPropA
GetScrollPos
GetForegroundWindow
IsWindowUnicode
IsWindowEnabled
SetFocus
WindowFromDC
kernel32
SetEndOfFile
ReadConsoleW
ReadFile
GetFileAttributesExW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
RaiseException
GetTimeZoneInformation
GetFullPathNameA
GetStringTypeW
SetEnvironmentVariableW
SetEnvironmentVariableA
SetStdHandle
FileTimeToSystemTime
GetProcAddress
GetModuleHandleA
IsDebuggerPresent
GlobalFlags
GetLastError
DeleteFileA
GlobalHandle
GetProcessHeap
GetCurrentProcessId
FindClose
GetDriveTypeA
SizeofResource
GlobalAlloc
WriteFile
LocalFlags
MoveFileA
CloseHandle
GetCurrentProcess
GetTickCount
GetCurrentThreadId
FlushFileBuffers
LockResource
GetFileType
GetStdHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
DeleteCriticalSection
GetTempPathA
GetFullPathNameW
GetLocalTime
SetErrorMode
GetCommandLineA
IsProcessorFeaturePresent
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
DeleteFileW
Sections
.text Size: 485KB - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE