Static task
static1
Behavioral task
behavioral1
Sample
2024-08-05_6e877e91ebdc0fbbced46af7bdedb9b6_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-05_6e877e91ebdc0fbbced46af7bdedb9b6_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-05_6e877e91ebdc0fbbced46af7bdedb9b6_bkransomware
-
Size
6.7MB
-
MD5
6e877e91ebdc0fbbced46af7bdedb9b6
-
SHA1
3878083686d6eba27e7d914235d8a817ec516f56
-
SHA256
4661333bebfb27d6d26b199112c8f18198539198a30f53bf1aabc717f543684b
-
SHA512
5524bd01e8dffad336ebee644b6285dc0f1476b65d3d8b368ac304d8fa056055b5988e1b83e64806009e658fd09c35bdcff3819046d091ba35e4dbfcaa34ecb7
-
SSDEEP
196608:r5VyxQv+JRbIeBTsWrupdujxWVckrxrujUt3lHM3:1we+JREeCWrsu4rrsUt3l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-05_6e877e91ebdc0fbbced46af7bdedb9b6_bkransomware
Files
-
2024-08-05_6e877e91ebdc0fbbced46af7bdedb9b6_bkransomware.exe windows:6 windows x86 arch:x86
53ee498cfa2e74a7147c36b7272c3cfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
FreeLibrary
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SwitchToThread
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapAlloc
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
RtlUnwind
RaiseException
GetCommandLineW
HeapFree
HeapReAlloc
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
SetStdHandle
WriteConsoleW
ReadConsoleW
CreateFileW
ResumeThread
SuspendThread
DeleteFileW
GetVersion
GetDriveTypeW
GetWindowsDirectoryW
WinExec
GetUserDefaultUILanguage
GetThreadPriority
GetExitCodeThread
GetThreadLocale
SetThreadLocale
GetPrivateProfileIntW
GetTempPathW
WritePrivateProfileStringW
ExitThread
FileTimeToSystemTime
GetFileAttributesW
HeapCreate
FormatMessageW
SizeofResource
Sleep
GetSystemDirectoryW
VirtualQueryEx
GetPrivateProfileStringW
SignalObjectAndWait
CreateDirectoryW
CompareFileTime
VerSetConditionMask
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
LoadResource
FindResourceW
SetErrorMode
SetFilePointer
EncodePointer
lstrcpyW
RemoveDirectoryW
LockResource
GetLastError
VerifyVersionInfoW
SetThreadPriority
lstrcpynW
LoadLibraryW
GetNumaHighestNodeNumber
GetStringTypeW
MultiByteToWideChar
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
CloseHandle
WideCharToMultiByte
user32
EndPaint
DestroyWindow
GetMessageA
GetDlgItemInt
SetWindowRgn
GetSystemMenu
CreateDialogParamA
GetMessageW
TrackPopupMenu
PostMessageW
DeleteMenu
GetParent
LoadIconA
MessageBeep
GetClientRect
CreateMenu
GetMenuItemInfoW
ShowCaret
BeginPaint
GetDoubleClickTime
WaitMessage
GetCapture
ShowCursor
SetDlgItemInt
GetMenu
GetWindowPlacement
GetWindowTextA
SetRect
GetScrollInfo
MessageBoxA
InvalidateRect
GetWindowLongW
GetWindowLongA
GetWindowTextW
MonitorFromWindow
SetClassLongA
CharUpperW
DefWindowProcA
SetFocus
DestroyCaret
SendDlgItemMessageW
ShowWindow
CreatePopupMenu
IsDlgButtonChecked
AppendMenuA
IsWindow
RemoveMenu
CreateWindowExW
CheckRadioButton
SystemParametersInfoA
ReleaseCapture
InsertMenuA
GetDlgItemTextW
MapWindowPoints
UpdateWindow
EnableWindow
SetWindowTextW
SetDlgItemTextA
ValidateRect
CheckMenuItem
GetMessageTime
RegisterClassA
GetWindow
ToAsciiEx
SetCursor
SetTimer
HideCaret
GetWindowRect
SendDlgItemMessageA
SetKeyboardState
GetKeyState
CharLowerBuffW
GetDC
GetKeyboardState
OffsetRect
SetPropA
GetClassNameW
ScrollWindow
SetWindowLongW
RedrawWindow
GetDesktopWindow
GetSysColorBrush
CreateCaret
PostMessageA
GetKeyboardType
GetSystemMetrics
SetWindowTextA
SendMessageW
GetDlgCtrlID
DialogBoxParamA
GetCaretBlinkTime
SetScrollInfo
GetMonitorInfoW
SetWindowsHookExA
gdi32
GetTextExtentPoint32W
PatBlt
GetTextExtentPoint32A
LineTo
CreateFontIndirectW
GetDeviceCaps
SetBkColor
CopyEnhMetaFileA
CreateHalftonePalette
CreateBitmap
CreatePenIndirect
CreateRectRgnIndirect
SetMapMode
CreateCompatibleBitmap
Rectangle
RealizePalette
SelectPalette
GetTextExtentExPointA
Polyline
CreatePen
SetTextAlign
CreateDIBitmap
EndDoc
GetStockObject
ExtTextOutA
CreateSolidBrush
TextOutA
DeleteDC
GetBitmapBits
ExtCreatePen
SetTextColor
MaskBlt
GetDIBits
SetDIBColorTable
SetPixel
SaveDC
GetCurrentPositionEx
CreateRectRgn
GetCharABCWidthsFloatA
RectVisible
RoundRect
GetPixel
RestoreDC
GetCharWidth32A
comdlg32
FindTextW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegLoadKeyW
RegEnumKeyExW
ControlService
GetLengthSid
GetUserNameA
RegSetKeySecurity
ChangeServiceConfigW
RegConnectRegistryW
RegGetKeySecurity
RegQueryInfoKeyW
CopySid
CloseServiceHandle
RegUnLoadKeyW
InitializeSecurityDescriptor
EqualSid
OpenSCManagerW
shell32
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
ExtractIconExW
SHGetFileInfoW
oleaut32
SysAllocStringLen
VariantClear
SysFreeString
SafeArrayPtrOfIndex
VariantInit
SafeArrayCreate
SysReAllocStringLen
Sections
.text Size: 752KB - Virtual size: 751KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.beSo Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ