C:\Jenkins\workspace\OC3.X\OC\Release\OCPacker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-07_395815d7980ad901717f4660ea2e00cf_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-07_395815d7980ad901717f4660ea2e00cf_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-07_395815d7980ad901717f4660ea2e00cf_bkransomware
-
Size
956KB
-
MD5
395815d7980ad901717f4660ea2e00cf
-
SHA1
77c363fa24bbeaba3fb843ad1644cef279b6477a
-
SHA256
87c9ed5bad5312dac441ef0393f8d172c9fd675e90a3c66e1d58b2cbb367348d
-
SHA512
5820d09f8557d863ac68852576c01a76ceb7fd5971bf50e67c362836dded81ab43a5e3da183fea671748d8d17b2ae39d01bc1c165a69839ff65b8178d402910d
-
SSDEEP
24576:a9uZT4pbE2OVpp1vG6qKyNTV+q07jjhmsa4Lv5e35v:0gTv2wHwmyNTAlBmfcUv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-07_395815d7980ad901717f4660ea2e00cf_bkransomware
Files
-
2024-08-07_395815d7980ad901717f4660ea2e00cf_bkransomware.exe windows:5 windows x86 arch:x86
240f3c8b5073e1eaae9777885f76451b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteFile
WideCharToMultiByte
ReadFile
CreateFileW
MultiByteToWideChar
GetCurrentDirectoryW
GetFileType
CloseHandle
LocalFree
FormatMessageW
GetSystemTimeAsFileTime
SetCurrentDirectoryW
SetFileAttributesW
GetFileAttributesW
LoadLibraryW
GetProcAddress
FreeLibrary
OutputDebugStringW
GetLastError
DeleteFileW
MoveFileW
MoveFileExW
FindResourceW
LoadResource
SizeofResource
GetTempPathW
GetTempFileNameW
GetCommandLineW
GetModuleHandleW
RemoveDirectoryW
GetCurrentThreadId
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
LockResource
SetFileTime
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
RtlUnwind
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
FlushFileBuffers
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetStringTypeW
CreateDirectoryW
GetCurrentProcess
SystemTimeToFileTime
SetFilePointer
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStartupInfoW
TlsFree
FindResourceExW
DosDateTimeToFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
ExitProcess
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
user32
wsprintfW
LoadIconW
PostQuitMessage
SetForegroundWindow
GetWindowThreadProcessId
GetForegroundWindow
IsWindowVisible
EndPaint
BeginPaint
DefWindowProcW
MessageBoxW
CreateWindowExW
RegisterClassExW
GetSysColorBrush
LoadCursorW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
SendMessageW
AttachThreadInput
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
CommandLineToArgvW
ShellExecuteExW
SHFileOperationW
SHGetFolderPathAndSubDirW
ole32
CoTaskMemFree
shlwapi
PathFileExistsW
comctl32
InitCommonControlsEx
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 815KB - Virtual size: 814KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ