H:\tftpd32\BIN\Release\tftpd32.x86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_ea8b46cacdc5ad4048ca9de10871813d_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_ea8b46cacdc5ad4048ca9de10871813d_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_ea8b46cacdc5ad4048ca9de10871813d_bkransomware
-
Size
1.1MB
-
MD5
ea8b46cacdc5ad4048ca9de10871813d
-
SHA1
ff037dab11e25f1667ede6ef1cf1ddfb96f2b885
-
SHA256
8128b0a8066693642b37344453c4d32a546b2287d4c15052d3e2602e41914239
-
SHA512
196ba5c8d5bb12fbb6d64355b357015f319f0079eb1d35c10cfe4bb09012e1b1fb77ced3b09f74e746a0721ea71ed321a3b871001a84a8d1dcd32991f0179b4d
-
SSDEEP
12288:tHf0Y6k4zeGQpEM3/WuMDygXtnrQugXtnrQhR1:tD34zxQnW3yCnvCnu1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-08_ea8b46cacdc5ad4048ca9de10871813d_bkransomware
Files
-
2024-08-08_ea8b46cacdc5ad4048ca9de10871813d_bkransomware.exe windows:5 windows x86 arch:x86
de580e883a504e2fc01b7ded57545b6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHBrowseForFolderA
DragFinish
DragAcceptFiles
DragQueryFileA
ShellExecuteA
SHGetPathFromIDListA
Shell_NotifyIconA
ws2_32
listen
accept
select
ntohs
getsockname
WSACloseEvent
WSAEventSelect
WSACreateEvent
WSAIoctl
gethostname
inet_ntoa
ntohl
htonl
setsockopt
bind
getservbyname
WSAStartup
WSACleanup
connect
recvfrom
getaddrinfo
WSAGetLastError
sendto
recv
socket
freeaddrinfo
getpeername
closesocket
gethostbyname
WSAAsyncSelect
getnameinfo
inet_addr
htons
send
WSASetLastError
comctl32
InitCommonControlsEx
iphlpapi
DeleteIpNetEntry
GetIpNetTable
GetAdaptersAddresses
SendARP
kernel32
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
SystemTimeToTzSpecificLocalTime
GetStringTypeW
FindFirstFileExW
DeleteFileW
GetCPInfo
GetOEMCP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetDriveTypeW
lstrlenA
lstrcatA
lstrcmpiA
GetModuleFileNameA
lstrcpyA
lstrcpynA
lstrcmpA
GetEnvironmentVariableA
OutputDebugStringA
GetCurrentProcess
Sleep
GetLastError
SetLastError
SetProcessWorkingSetSize
CreateMutexA
ReleaseMutex
CloseHandle
GetFullPathNameA
GetVersion
GetLocalTime
CreateProcessA
CreateFileA
GetFileSize
WaitForSingleObject
WriteFile
GetFileAttributesA
CreateSemaphoreA
ReadFile
ReleaseSemaphore
SetCurrentDirectoryA
GetCurrentDirectoryA
DeleteFileA
SetEnvironmentVariableA
RemoveDirectoryA
SetFilePointer
FlushFileBuffers
GetTickCount
GetCurrentThreadId
ResetEvent
GetSystemTime
SetEvent
GetCurrentThread
CreateEventA
SetThreadPriority
WaitForMultipleObjects
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
FormatMessageA
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FileTimeToSystemTime
GetDateFormatA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetACP
IsValidCodePage
RtlUnwind
DeleteCriticalSection
LoadLibraryExW
OutputDebugStringW
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
GetTimeZoneInformation
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineA
HeapReAlloc
HeapAlloc
ResumeThread
ExitThread
AreFileApisANSI
SetStdHandle
GetProcAddress
ExitProcess
DecodePointer
EncodePointer
WideCharToMultiByte
MultiByteToWideChar
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameW
GetFileType
GetStdHandle
HeapFree
IsProcessorFeaturePresent
IsDebuggerPresent
HeapSize
SetFilePointerEx
GetFileInformationByHandle
PeekNamedPipe
GetFullPathNameW
GetCurrentDirectoryW
CreateFileW
ReadConsoleW
SetEndOfFile
CopyFileA
CreateDirectoryW
user32
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
GetFocus
DialogBoxParamA
CreateWindowExA
GetClassInfoA
RegisterClassA
SystemParametersInfoA
UnhookWindowsHookEx
SetWindowsHookExA
MessageBeep
wvsprintfA
MapDialogRect
InvalidateRect
RedrawWindow
MoveWindow
SetTimer
SendDlgItemMessageA
KillTimer
SetForegroundWindow
LoadIconA
ChildWindowFromPoint
GetWindowTextA
SetDlgItemTextA
SetWindowTextA
SetWindowLongA
MessageBoxA
UnregisterClassA
SetClassLongA
DefWindowProcA
GetSysColor
IsWindow
GetSystemMetrics
EnableWindow
CallWindowProcA
FindWindowA
DestroyIcon
CheckMenuItem
GetWindow
ReleaseDC
DestroyWindow
GetSystemMenu
GetWindowRect
CreateDialogParamA
GetTopWindow
GetClientRect
SetWindowPos
ShowWindow
AppendMenuA
IsWindowVisible
GetDialogBaseUnits
PostMessageA
GetDlgItemInt
SetDlgItemInt
GetDlgItemTextA
TrackPopupMenu
GetSubMenu
GetParent
LoadMenuA
wsprintfA
GetWindowLongA
GetDlgItem
GetCursorPos
DestroyMenu
SendMessageA
EndDialog
GetDC
gdi32
SetTextColor
ExtTextOutA
GetTextMetricsA
LPtoDP
GetTextExtentPoint32A
SetBkColor
comdlg32
GetOpenFileNameA
advapi32
RegSetValueExA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 854KB - Virtual size: 854KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ