Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_79ed974f5632fd1cf7444cc88302c619_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-06_79ed974f5632fd1cf7444cc88302c619_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-06_79ed974f5632fd1cf7444cc88302c619_bkransomware
-
Size
6.7MB
-
MD5
79ed974f5632fd1cf7444cc88302c619
-
SHA1
72d7ef8ea328e919c91da77c4c9937aeb35e97b1
-
SHA256
ccf9da3c2be710b5aabeb66840b2418812e60d65da0bb2ee1dd0b3a787aad8d6
-
SHA512
bdfca6214aa418c5bf19a0f5524d20771f8bc364eb8c13c559ce77499a5dbc0b5e0023a76f6b173e03dda986ca247201d017f8d313776c78bffaa221f1a8325c
-
SSDEEP
196608:AvonCI60HnlQWmeW3urL5u2twPqM/CEs6HVGp87:AQ/DW+5uCNX6Hw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-06_79ed974f5632fd1cf7444cc88302c619_bkransomware
Files
-
2024-08-06_79ed974f5632fd1cf7444cc88302c619_bkransomware.exe windows:6 windows x86 arch:x86
86da32d3436240bb8cd7b2a9654d6aa6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapSize
ReleaseSemaphore
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapAlloc
LoadLibraryExW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
SetStdHandle
WriteConsoleW
ReadConsoleW
LoadLibraryW
ExpandEnvironmentStringsW
GetSystemTime
FindNextFileW
CreateEventW
GetFileType
FindFirstFileA
GetOverlappedResult
CreateFileW
TerminateProcess
MulDiv
ExitProcess
GetFileAttributesA
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
SetCommBreak
WaitForSingleObject
GlobalLock
GetModuleHandleExW
HeapFree
WaitNamedPipeA
GetCPInfo
MapViewOfFile
GlobalMemoryStatus
CreateFileA
GetCommandLineW
TlsAlloc
CreatePipe
ResetEvent
GlobalFree
FlushFileBuffers
CompareStringW
Sleep
WideCharToMultiByte
OpenProcess
TlsSetValue
GetProcessTimes
SetCommTimeouts
GetCommandLineA
ExpandEnvironmentStringsA
SetHandleInformation
GetCommState
SetEndOfFile
UnmapViewOfFile
ExitThread
CreateThread
CloseHandle
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
user32
ShowOwnedPopups
DestroyAcceleratorTable
CreateDialogParamA
GetMessageW
SendDlgItemMessageA
SetKeyboardState
DrawIconEx
GetWindowInfo
DrawEdge
SetScrollRange
GetKeyboardState
OffsetRect
GetKeyboardLayout
SetRect
MessageBoxA
UnionRect
InvalidateRect
UnregisterClassA
PeekMessageA
EnableMenuItem
DrawStateW
SetWindowsHookExA
GetSysColor
CheckDlgButton
ShowWindow
SetMenu
DrawMenuBar
CreateCaret
CreateWindowExW
SystemParametersInfoA
SetCaretPos
SendMessageW
UpdateWindow
ToUnicode
SetDlgItemTextA
SetScrollInfo
EndPaint
ClientToScreen
HideCaret
MapDialogRect
PostQuitMessage
TrackPopupMenu
IsIconic
SetCapture
KillTimer
IsZoomed
DeleteMenu
SetParent
CreateMenu
GetDC
DrawFocusRect
ShowCursor
InflateRect
SetPropA
GetScrollInfo
GetWindowLongA
SetClassLongA
DestroyCursor
GetDesktopWindow
IsDlgButtonChecked
AppendMenuA
BeginDeferWindowPos
SetWindowTextA
EnableWindow
LoadCursorA
DrawFrameControl
GetWindowThreadProcessId
RegisterClassA
GetDlgItemTextA
gdi32
SetWindowOrgEx
TranslateCharsetInfo
PatBlt
GetTextExtentPoint32A
ExtFloodFill
GetMetaFileBitsEx
MaskBlt
DeleteDC
CreateFontA
StretchBlt
SetDIBColorTable
CreateHalftonePalette
GetEnhMetaFileHeader
CreateBitmap
CreatePenIndirect
Rectangle
SetPolyFillMode
GetBkColor
CreateBitmapIndirect
SetPaletteEntries
GetDIBColorTable
GetCharABCWidthsW
CreateRectRgn
GetTextExtentPointA
GetPixel
ExtCreatePen
CreatePolygonRgn
MoveToEx
GetWindowOrgEx
GetDIBits
CopyEnhMetaFileA
CreateCompatibleDC
CreateRectRgnIndirect
PlayEnhMetaFile
SetMapMode
Ellipse
OffsetRgn
SaveDC
GetObjectType
GetCurrentPositionEx
GetNearestPaletteIndex
RoundRect
SetWinMetaFileBits
ExtTextOutA
CreateEnhMetaFileW
CreateSolidBrush
TextOutA
SetTextAlign
advapi32
RegCloseKey
AllocateAndInitializeSid
RegDeleteValueA
SetSecurityDescriptorDacl
CopySid
RegOpenKeyExA
LookupPrivilegeValueW
shell32
ShellExecuteExW
Sections
.text Size: 684KB - Virtual size: 683KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KeYt Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ