Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_d2f79fa070ae49ef50f9e8c8f836d5e8_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-08_d2f79fa070ae49ef50f9e8c8f836d5e8_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_d2f79fa070ae49ef50f9e8c8f836d5e8_bkransomware
-
Size
6.7MB
-
MD5
d2f79fa070ae49ef50f9e8c8f836d5e8
-
SHA1
40f96980afb9994f515b48f6e3c49eff91c213ad
-
SHA256
d9760f403527973c3f775f86099a6ae32d4d20855987f3fce5962af03e58ef6c
-
SHA512
c5f316b55d5755d9e002c6dcf12e9e55ae39e31b3a961d8c5df2e874f647330457b04c7cc7de8268fd33d0718783c73e2a43e6d48e1d1eedbb9d5a3750e60664
-
SSDEEP
98304:4SWbawpzRUp5Tb66/COmsCf4sTl7svq699ydl4b7zebDkJRbJqSKK:4bj6p5iwms0TBsvWOu6hmK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-08_d2f79fa070ae49ef50f9e8c8f836d5e8_bkransomware
Files
-
2024-08-08_d2f79fa070ae49ef50f9e8c8f836d5e8_bkransomware.exe windows:6 windows x86 arch:x86
cdfc81e5e76a7bccb77cb6e72ab88d6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetStdHandle
GetOEMCP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
GetUserDefaultLCID
IsValidLocale
LCMapStringW
UnregisterWait
SetStdHandle
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapAlloc
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsGetValue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
HeapFree
HeapReAlloc
GetLastError
DeleteCriticalSection
LeaveCriticalSection
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
WaitForSingleObject
DuplicateHandle
WriteConsoleW
ReadConsoleW
LoadLibraryW
EnumSystemLocalesW
GetSystemTime
GetCommandLineW
OpenFileMappingA
CloseHandle
TlsAlloc
FindNextFileA
GetModuleFileNameA
CreatePipe
GetFileType
LoadLibraryA
GetLocalTime
FindClose
EnterCriticalSection
IsDBCSLeadByteEx
FindFirstFileA
RaiseException
MultiByteToWideChar
GetACP
CompareStringW
GetOverlappedResult
GetTimeZoneInformation
GetModuleFileNameW
CreateProcessA
MulDiv
GetFileAttributesA
CreateEventA
Sleep
GetLocaleInfoW
TlsSetValue
SetCommTimeouts
GetWindowsDirectoryA
SetCommBreak
SetHandleInformation
SetEnvironmentVariableW
InitializeSListHead
GetCurrentProcess
WaitNamedPipeA
SetDllDirectoryW
LoadLibraryExW
FreeLibrary
SetEndOfFile
GetCPInfo
UnmapViewOfFile
MapViewOfFile
GlobalMemoryStatus
GetDateFormatW
GetEnvironmentVariableW
CreateThread
TlsFree
GetStringTypeW
CreateEventW
ResetEvent
GlobalFree
CreateNamedPipeA
SetLastError
FlushFileBuffers
CreateFileW
TerminateProcess
Beep
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
OpenProcess
GetCurrentThread
GetTickCount
WaitForSingleObjectEx
ConnectNamedPipe
GlobalLock
GetEnvironmentStringsW
GetCommState
VirtualQuery
RegisterWaitForSingleObject
user32
ClientToScreen
GetWindowRect
GetMessageW
ShowOwnedPopups
GetSystemMenu
SetWindowRgn
PostQuitMessage
IsIconic
IsZoomed
GetParent
LoadIconA
GetWindowInfo
MessageBeep
GetClientRect
CreateMenu
SetFocus
GetWindowTextLengthA
ShowCaret
BeginPaint
DrawFocusRect
ShowCursor
GetKeyboardState
InflateRect
CreateDialogIndirectParamA
GetWindowPlacement
GetWindowTextA
SetPropA
GetKeyboardLayout
SetWindowLongA
GetScrollInfo
MessageBoxA
DrawStateW
GetDlgItem
EndDialog
RedrawWindow
DestroyCursor
GetSysColor
ShowWindow
SetMenu
EnableScrollBar
AppendMenuA
FlashWindow
CreateWindowExW
MessageBoxW
ReleaseCapture
SetWindowTextA
SendMessageW
UpdateWindow
EnableWindow
EndMenu
LoadCursorA
DialogBoxParamA
ToUnicode
DestroyIcon
SetDlgItemTextA
SetScrollInfo
CheckMenuItem
CopyRect
GetWindowThreadProcessId
RegisterClassA
IsRectEmpty
ToAsciiEx
EndPaint
DestroyWindow
GetMessageA
DestroyAcceleratorTable
CreateDialogParamA
TrackPopupMenu
SetKeyboardState
SetCapture
EnumWindows
GetDoubleClickTime
CreateIconIndirect
GetDC
UnregisterClassA
SystemParametersInfoW
PeekMessageA
EnableMenuItem
DefWindowProcA
GetDesktopWindow
IsDlgButtonChecked
DrawMenuBar
IsWindow
RemoveMenu
CheckRadioButton
SystemParametersInfoA
ScrollWindowEx
GetDlgItemTextA
gdi32
ExtFloodFill
SetWindowExtEx
GetCharacterPlacementW
Polygon
GetDeviceCaps
SetPixel
DeleteObject
SelectObject
GetPaletteEntries
CreateCompatibleDC
PolyPolyline
CreateRectRgnIndirect
SetMapMode
Rectangle
CreateBrushIndirect
ExtCreateRegion
GetObjectType
StretchDIBits
CreateBitmapIndirect
SetPaletteEntries
GetObjectW
GetNearestPaletteIndex
GetCharABCWidthsFloatA
CreatePatternBrush
RectVisible
CreateDIBitmap
GetTextExtentPoint32A
ExtTextOutA
CloseEnhMetaFile
CreateEnhMetaFileW
RestoreDC
CreateSolidBrush
GetBkColor
MoveToEx
GetWindowOrgEx
GetMetaFileBitsEx
SetTextColor
CreateHatchBrush
DeleteDC
CreateFontA
StretchBlt
CreateFontIndirectA
SetBkColor
SetDIBColorTable
CopyEnhMetaFileA
ExcludeClipRect
CreateHalftonePalette
GetEnhMetaFileHeader
SelectClipRgn
PtInRegion
CreateCompatibleBitmap
SaveDC
GetTextExtentPointW
GetDIBColorTable
GetTextExtentPointA
GetSystemPaletteEntries
SetROP2
EndDoc
Arc
EndPage
PolyPolygon
SetWindowOrgEx
ExtCreatePen
GetPixel
GetStockObject
advapi32
EqualSid
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExW
SetSecurityDescriptorDacl
AdjustTokenPrivileges
GetLengthSid
AllocateAndInitializeSid
RegDeleteValueA
InitializeSecurityDescriptor
RegQueryValueExW
shell32
ShellExecuteExW
Sections
.text Size: 718KB - Virtual size: 718KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NIv Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ