Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_764c0da4361e61b425bdd71871da919c_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_764c0da4361e61b425bdd71871da919c_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_764c0da4361e61b425bdd71871da919c_bkransomware
-
Size
6.8MB
-
MD5
764c0da4361e61b425bdd71871da919c
-
SHA1
fc0d9391eb0eff3001f17bcd04bd904e0dc09323
-
SHA256
f4f6c9917a1731019e8a3a749ddab6daef3affd2a2071b0e3561c199e4788e3c
-
SHA512
b487f1411652d5f7cb3039a7db555bdd8c816bf252eab42ef2fc5e8a176c883b3078e1bed91c0b9ffc1abc50e078552d3fd1274889fcf14136bfb25cdfbbdef2
-
SSDEEP
196608:9bEhUw7mbFCFLy6Y5GJu2PpNXytpJM4jsYLCBxuk:ZwyBELK8uEt6HTLCB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-08_764c0da4361e61b425bdd71871da919c_bkransomware
Files
-
2024-08-08_764c0da4361e61b425bdd71871da919c_bkransomware.exe windows:6 windows x86 arch:x86
a73edfdfbcf581bf35aac496eba73339
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsDebuggerPresent
GetProcessHeap
HeapSize
ExitProcess
GetUserDefaultLCID
GetLocaleInfoW
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
InterlockedPopEntrySList
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapAlloc
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsGetValue
TlsAlloc
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
HeapReAlloc
GetLastError
DeleteCriticalSection
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
SetStdHandle
WriteConsoleW
ReadConsoleW
LoadLibraryW
GetCommandLineW
EnumSystemLocalesW
GetSystemTime
GetThreadTimes
GetCurrentProcessId
CreateFileMappingA
GetLocalTime
ResetEvent
GlobalFree
CreateNamedPipeA
IsDBCSLeadByteEx
RaiseException
FlushFileBuffers
CreateFileW
MulDiv
GetFileAttributesA
CreateEventA
Sleep
GetConsoleCP
TlsSetValue
SetCommTimeouts
GetWindowsDirectoryA
GetCurrentThread
WaitForSingleObjectEx
GetModuleHandleExW
HeapFree
QueryPerformanceCounter
GetCurrentProcess
GetCommState
FreeLibrary
GetModuleFileNameA
LocalFree
CloseHandle
GetStringTypeW
FindNextFileA
CreatePipe
IsValidCodePage
SetLastError
MultiByteToWideChar
CompareStringW
TerminateProcess
IsProcessorFeaturePresent
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
IsValidLocale
WideCharToMultiByte
GetProcessTimes
ClearCommBreak
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
WaitForSingleObject
GlobalLock
SetHandleInformation
WaitNamedPipeA
LoadLibraryExW
MapViewOfFile
GetLocaleInfoA
GlobalMemoryStatus
GetDateFormatW
GetProcessAffinityMask
EnterCriticalSection
DecodePointer
EncodePointer
GetExitCodeThread
DuplicateHandle
GetCurrentThreadId
user32
RegisterClassA
DestroyAcceleratorTable
SetWindowRgn
GetMessageW
TrackPopupMenu
MsgWaitForMultipleObjects
IsZoomed
DrawIconEx
LoadStringA
GetParent
LoadIconA
RemovePropA
GetWindowInfo
SetParent
SetFocus
SetScrollRange
GetCapture
GetKeyboardState
CreateDialogIndirectParamA
GetWindowPlacement
GetWindowTextA
SetRect
SetWindowLongA
GetScrollInfo
MessageBoxA
UnionRect
InvalidateRect
UnregisterClassA
GetWindowLongA
ReleaseDC
EndDialog
DefWindowProcA
CheckDlgButton
ShowWindow
CreatePopupMenu
EnableScrollBar
FlashWindow
CreateWindowExW
ScrollWindowEx
GetSystemMetrics
SetWindowTextA
ValidateRgn
SendMessageW
UpdateWindow
GetDlgItemTextA
SetDlgItemTextA
CheckMenuItem
GetWindowThreadProcessId
ScrollWindow
ShowOwnedPopups
EndPaint
DestroyWindow
GetMessageA
HideCaret
SendDlgItemMessageA
IsIconic
DeleteMenu
GetWindowTextLengthA
DrawEdge
EnumWindows
GetDC
DrawFocusRect
ShowCursor
EnableMenuItem
GetDlgItem
RedrawWindow
GetDesktopWindow
GetSysColor
SetMenu
IsDlgButtonChecked
DrawMenuBar
CheckRadioButton
SystemParametersInfoA
BeginDeferWindowPos
RegisterClassW
SetCaretPos
SetScrollInfo
GetMessageTime
gdi32
SetWindowOrgEx
PolyPolygon
TranslateCharsetInfo
Arc
SetViewportOrgEx
LineTo
SetWindowExtEx
GetMetaFileBitsEx
SetTextColor
MaskBlt
CreateHatchBrush
CreateFontA
CopyEnhMetaFileA
GdiFlush
GetEnhMetaFileHeader
GetRegionData
DeleteObject
SelectObject
GetPaletteEntries
CreatePenIndirect
PolyPolyline
CreateCompatibleBitmap
OffsetRgn
SaveDC
RealizePalette
GetObjectType
GetTextExtentPointW
GetBkColor
GetObjectW
GetTextExtentExPointA
GetCharWidth32A
GetCharABCWidthsFloatA
SetROP2
SetWinMetaFileBits
ExtTextOutA
CloseEnhMetaFile
RestoreDC
CreateSolidBrush
MoveToEx
EndPage
GetTextExtentPoint32A
GetCharacterPlacementW
DeleteDC
CreateFontIndirectA
SetDIBColorTable
SetPixel
CreateCompatibleDC
CreateRectRgnIndirect
SetMapMode
Rectangle
CreateBrushIndirect
GetCurrentPositionEx
Polyline
RectVisible
IntersectClipRect
CreateDIBitmap
GetPixel
EndDoc
GetStockObject
CombineRgn
advapi32
SetSecurityDescriptorOwner
LookupPrivilegeValueW
RegDeleteKeyA
CopySid
EqualSid
GetLengthSid
GetUserNameA
RegOpenKeyExW
RegOpenKeyExA
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 775KB - Virtual size: 774KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enZ Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ