Static task
static1
Behavioral task
behavioral1
Sample
2024-08-09_2e8195fe5160b8f90596c12321c59418_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-09_2e8195fe5160b8f90596c12321c59418_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-09_2e8195fe5160b8f90596c12321c59418_bkransomware
-
Size
6.7MB
-
MD5
2e8195fe5160b8f90596c12321c59418
-
SHA1
9bedd48c4e1c2304c1d1496a3a8b71cdc458f1c9
-
SHA256
01666bbb01cbd5b6951c1bc5d1552f204854cac9d28738f9690d3d7acb2f8d53
-
SHA512
a731ada98058b015051244663a6d5bf0bb0358e06efa980723dfe33ae7ef271e202dd4bb4ebf9f25b81f990f67158cf32253c132c05c1e90cf9c70f3c7a17335
-
SSDEEP
196608:QoGY7rbdyTjt24YK2y+VYFqlFXbJXSezZAtnt8QWm6BVz:Qod1+4zjyVSXJzcaQWm6BVz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-09_2e8195fe5160b8f90596c12321c59418_bkransomware
Files
-
2024-08-09_2e8195fe5160b8f90596c12321c59418_bkransomware.exe windows:6 windows x86 arch:x86
08a216cdb77f8b22a4eef30296dcf26c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetModuleFileNameW
GetStdHandle
GetACP
IsDebuggerPresent
GetProcessHeap
HeapSize
GetModuleHandleExW
GetUserDefaultLCID
GetLocaleInfoW
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapAlloc
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
SetStdHandle
WriteConsoleW
ReadConsoleW
LoadLibraryW
EnumSystemLocalesW
TlsFree
OpenFileMappingA
FindNextFileW
GetModuleFileNameA
LoadLibraryA
IsValidCodePage
IsDBCSLeadByteEx
FindFirstFileA
FlushFileBuffers
GetCommandLineW
IsProcessorFeaturePresent
LeaveCriticalSection
CreateEventA
Sleep
InitializeCriticalSectionAndSpinCount
TlsSetValue
GetProcessTimes
GetCommandLineA
ClearCommBreak
WaitForSingleObjectEx
ConnectNamedPipe
GlobalLock
QueryPerformanceCounter
InitializeSListHead
VirtualQuery
LocalFree
GetCurrentProcessId
GetOEMCP
GetFileType
ResetEvent
FindClose
EnterCriticalSection
CreateNamedPipeA
SetLastError
GlobalUnlock
CompareStringW
CreateFileW
GetSystemDirectoryA
TerminateProcess
Beep
IsValidLocale
OpenProcess
SetCommTimeouts
GetTickCount
SetEnvironmentVariableW
GetCommState
LoadLibraryExW
FreeLibrary
GetCPInfo
MapViewOfFile
TlsGetValue
GlobalMemoryStatus
CreateFileA
GetEnvironmentVariableW
ExitProcess
TlsAlloc
CreateEventW
WideCharToMultiByte
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
DeleteCriticalSection
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
HeapFree
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
SetCursor
CreateDialogParamA
GetMessageW
SendDlgItemMessageA
IsIconic
KillTimer
MsgWaitForMultipleObjects
DrawIconEx
GetWindowInfo
WaitMessage
ShowCursor
GetKeyboardState
OffsetRect
SetPropA
CheckMenuRadioItem
SetWindowLongA
MessageBoxA
UnregisterClassA
SystemParametersInfoW
SetScrollPos
EnableMenuItem
GetDlgItem
ScrollWindow
CheckDlgButton
ShowWindow
EnableScrollBar
IsWindow
PostMessageA
RemoveMenu
FlashWindow
CreateWindowExW
CheckRadioButton
SendMessageW
UpdateWindow
DialogBoxParamA
ToUnicode
GetWindowThreadProcessId
EndPaint
ClientToScreen
GetMessageA
MapDialogRect
SetCapture
DeleteMenu
LoadIconA
GetClientRect
ShowCaret
BeginPaint
CreateIconIndirect
GetDC
GetCapture
GetWindowLongA
SetClassLongA
DrawStateW
DestroyCursor
GetDesktopWindow
GetSysColor
SetMenu
CreateCaret
ReleaseCapture
ScrollWindowEx
SetCaretPos
InsertMenuA
ValidateRgn
DrawFrameControl
CheckMenuItem
IsRectEmpty
SystemParametersInfoA
gdi32
GetBitmapBits
EndPage
SetLayout
Arc
GetTextExtentPoint32A
SetViewportOrgEx
GetDIBits
SetBkColor
SetDIBColorTable
GdiFlush
CreateHalftonePalette
GetEnhMetaFileHeader
GetRegionData
SelectObject
SelectClipRgn
Ellipse
OffsetRgn
ExtCreateRegion
SetPolyFillMode
GetObjectType
CreateBitmapIndirect
GetDIBColorTable
GetObjectW
GetCharWidth32A
GetClipBox
RectVisible
IntersectClipRect
GetPixel
GetStockObject
ExtTextOutA
UpdateColors
CreateSolidBrush
SetWindowOrgEx
BitBlt
TranslateCharsetInfo
SetWindowExtEx
CreateFontA
ExcludeClipRect
SetPixel
PtInRegion
CreatePenIndirect
CreateCompatibleDC
PlayEnhMetaFile
Rectangle
GetCurrentPositionEx
GetNearestPaletteIndex
GetTextExtentPointA
CreatePatternBrush
SetViewportExtEx
CreateDIBitmap
RestoreDC
ExtFloodFill
advapi32
AdjustTokenPrivileges
GetLengthSid
SetSecurityDescriptorDacl
EqualSid
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 710KB - Virtual size: 709KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KcHRg Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ