Static task
static1
Behavioral task
behavioral1
Sample
2024-08-11_55aa6c867cd5b88f434ea9a97c5e22db_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-11_55aa6c867cd5b88f434ea9a97c5e22db_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-11_55aa6c867cd5b88f434ea9a97c5e22db_bkransomware
-
Size
586KB
-
MD5
55aa6c867cd5b88f434ea9a97c5e22db
-
SHA1
9d35f6e4d49af3210fb30929d03ca7c784115951
-
SHA256
e730d38d67ddbf46751b0dd73b99c2fe07d0510e4d0d39561ff167357425975f
-
SHA512
2f85f4c2da37c06eb68cbc28d8998643108db11c8a7fba2a8af79a147c0fbc1f580f05aff1ee1ed8621ad718ff33cc407544a2cdde0025f221da74082642a713
-
SSDEEP
12288:UzUgawtW+2O60y0b/0Wz89iSGp5+ZgzisfO+XHtbzP:CXtxuZ0YWITk+Zii+R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-11_55aa6c867cd5b88f434ea9a97c5e22db_bkransomware
Files
-
2024-08-11_55aa6c867cd5b88f434ea9a97c5e22db_bkransomware.exe windows:5 windows x86 arch:x86
308044337b76d7dfa29442acd96fa9ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStretchBltMode
GetNearestPaletteIndex
SetTextCharacterExtra
UpdateColors
GetTextColor
GetTextCharset
GetMetaRgn
GetPixelFormat
GetDCBrushColor
GetDCPenColor
GetTextCharsetInfo
GetFontLanguageInfo
GetGraphicsMode
GetObjectType
GetMapMode
SetPixel
GetFontUnicodeRanges
GetRandomRgn
GetNearestColor
user32
IsWindowUnicode
GetKeyboardType
GetWindowLongA
GetScrollPos
GetInputState
GetDlgItemInt
GetMenuContextHelpId
GetForegroundWindow
GetWindowContextHelpId
GetWindowDC
DrawTextA
IsWindowEnabled
MoveWindow
ShowWindow
EndDialog
SetFocus
LoadIconA
SendMessageA
SetDlgItemTextA
GetMenuState
GetDC
PostMessageA
CheckDlgButton
GetDlgItem
EnableWindow
EndPaint
GetCursor
GetMenuItemCount
BeginPaint
RemovePropA
GetMenuItemID
GetMenu
kernel32
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
GetFileAttributesExW
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
MoveFileExW
SetStdHandle
GetFullPathNameA
GetStringTypeW
RaiseException
GetModuleHandleA
GetProcAddress
LockResource
GetVersion
GetCurrentThreadId
GetCurrentProcessId
IsDebuggerPresent
IsProcessorFeaturePresent
SetFilePointer
GetLastError
LoadResource
FlushFileBuffers
GlobalFlags
GlobalHandle
GetFileTime
GetCurrentProcess
FindResourceA
LocalFlags
WriteFile
MoveFileA
GetStdHandle
SizeofResource
GetTickCount
FindClose
GlobalSize
GetFileType
DeleteFileA
GetDriveTypeA
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimeAsFileTime
GetCommandLineA
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetCurrentThread
GetConsoleCP
GetConsoleMode
CloseHandle
DeleteFileW
SetEnvironmentVariableA
Sections
.text Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE