Static task
static1
Behavioral task
behavioral1
Sample
2024-08-03_564117a9997d6960f9ad17c866077259_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-03_564117a9997d6960f9ad17c866077259_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-03_564117a9997d6960f9ad17c866077259_bkransomware
-
Size
602KB
-
MD5
564117a9997d6960f9ad17c866077259
-
SHA1
3a9dbeb00b5304bf8db589a6a10c22185d14b0e6
-
SHA256
6e591d0ae62c5de599459653184e43b78d4f20bbd6df42bc3d13ae964eef5087
-
SHA512
354ca356288074cf251c0736280960a9be323e41ad3cb736a232b78482e8b3ca312957eb1cba0f6833e048f6f124539681324085f11702d25fe9abbb4f942987
-
SSDEEP
12288:Aoh6TTE4HmMDFhPRnffamonbFiUBKgwJSaDw:AQ6fE4GM5hxHaDb1Qz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-03_564117a9997d6960f9ad17c866077259_bkransomware
Files
-
2024-08-03_564117a9997d6960f9ad17c866077259_bkransomware.exe windows:5 windows x86 arch:x86
6909228d2292354b250dfdbacd8d72ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetMetaRgn
GetCurrentObject
GetGraphicsMode
GetDeviceCaps
GetPixelFormat
GetTextCharacterExtra
GetTextColor
GetPolyFillMode
GetBkColor
GetTextCharsetInfo
GetSystemPaletteUse
GetMapMode
GetDCBrushColor
GetTextAlign
GetDCPenColor
SetSystemPaletteUse
GetTextCharset
GetRandomRgn
SetTextCharacterExtra
GetFontLanguageInfo
SetTextColor
GetClipRgn
GetFontUnicodeRanges
SetTextAlign
GetNearestColor
GetNearestPaletteIndex
GetStretchBltMode
GetObjectType
SetTextJustification
user32
EndPaint
GetDC
IsWindowEnabled
PostMessageA
GetMenu
IsWindowUnicode
GetCursor
GetQueueStatus
GetMenuContextHelpId
GetDlgItemInt
SetWindowTextA
GetWindowLongA
RemovePropA
SetDlgItemTextA
GetWindowContextHelpId
BeginPaint
CheckDlgButton
GetInputState
GetMenuCheckMarkDimensions
ShowWindow
DrawTextA
GetMenuItemCount
GetMenuItemID
SendMessageA
GetDlgItem
GetPropA
SetFocus
EndDialog
LoadIconA
EnableWindow
kernel32
SetEndOfFile
ReadConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
SetStdHandle
DeleteFileW
CreatePipe
GetExitCodeProcess
WaitForSingleObject
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFileAttributesExW
GetFullPathNameW
GetProcAddress
GetModuleHandleA
GlobalSize
IsDebuggerPresent
GetTickCount
GetCurrentThreadId
SetFilePointer
LockResource
GlobalFlags
GetVersion
GetFileTime
DeleteFileA
GetDriveTypeA
GetCurrentProcessId
GlobalHandle
GlobalAlloc
GetLastError
GetProcessHeap
QueryPerformanceCounter
GetCurrentProcess
FlushFileBuffers
SizeofResource
LoadResource
LocalFlags
CloseHandle
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
DuplicateHandle
CreateProcessA
GetLocalTime
GetTimeZoneInformation
Beep
Sleep
GetTempPathW
SetErrorMode
GetCommandLineA
IsProcessorFeaturePresent
GetStdHandle
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
SetLastError
GetCurrentThread
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RaiseException
ReadFile
SetFilePointerEx
GetStringTypeW
GetFileType
GetFullPathNameA
Sections
.text Size: 535KB - Virtual size: 535KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE