Static task
static1
Behavioral task
behavioral1
Sample
2024-08-17_06e800fb666fd6a1962088f3daf9dc03_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-17_06e800fb666fd6a1962088f3daf9dc03_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-17_06e800fb666fd6a1962088f3daf9dc03_bkransomware
-
Size
571KB
-
MD5
06e800fb666fd6a1962088f3daf9dc03
-
SHA1
6e801387203496cbbb1191a95c2a0bd1397b9bdc
-
SHA256
a3bdae6e8ef7055632240cea6f0ae988e82df8f80655a3c95702c9755b22512a
-
SHA512
3794254763e2825e30b3e3f4834dabc56e931ec077d4d9c1e29fbc101e6eda5318cb6e49194893d7091fb4e8cb488310c61528057ab135ec6ece8fee1b81e975
-
SSDEEP
12288:h78YrCHRsXL2B9JSgvayi5+rb8pxwcLYykmYn8kp0:aUb49JSgvF3rb8fjLdkX8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-17_06e800fb666fd6a1962088f3daf9dc03_bkransomware
Files
-
2024-08-17_06e800fb666fd6a1962088f3daf9dc03_bkransomware.exe windows:5 windows x86 arch:x86
21dd45774bf26bb291fe0c605a914989
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextJustification
SetPixel
SetTextAlign
UpdateColors
GetMetaRgn
GetNearestColor
GetBkColor
GetPixelFormat
SetTextColor
SetTextCharacterExtra
GetDCBrushColor
GetNearestPaletteIndex
GetObjectType
GetCurrentObject
GetDCPenColor
SetSystemPaletteUse
GetDeviceCaps
GetClipRgn
GetGraphicsMode
GetPolyFillMode
GetMapMode
GetStretchBltMode
GetRandomRgn
user32
GetMenuItemID
ShowWindow
GetDialogBaseUnits
GetWindowLongA
EndDialog
EnableWindow
GetDlgItem
GetDlgItemInt
GetPropA
GetMenuItemCount
SetDlgItemTextA
WindowFromDC
GetMenuCheckMarkDimensions
SetFocus
GetQueueStatus
IsWindowUnicode
GetCursor
GetMenu
BeginPaint
GetScrollPos
GetWindowContextHelpId
CheckDlgButton
DrawTextA
GetMenuContextHelpId
GetForegroundWindow
PostMessageA
GetWindowDC
IsWindowEnabled
kernel32
SetEndOfFile
SetEnvironmentVariableW
GetTimeZoneInformation
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetModuleFileNameA
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetProcAddress
GetModuleHandleA
IsProcessorFeaturePresent
GetCurrentProcessId
LockResource
IsDebuggerPresent
DeleteFileA
GetFileTime
SetFilePointer
GetLastError
FindClose
GetTickCount
CloseHandle
FindResourceA
GetCurrentThreadId
GetDriveTypeA
GetFileType
LocalFlags
LoadResource
GlobalSize
GetStdHandle
SizeofResource
GlobalAlloc
GetCurrentProcess
GlobalFlags
MoveFileA
QueryPerformanceCounter
FlushFileBuffers
WriteFile
GetVersion
GetProcessHeap
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetFullPathNameA
GetLocalTime
Beep
Sleep
GetTempPathW
DeleteCriticalSection
GetCommandLineA
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
SetLastError
GetCurrentThread
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
DeleteFileW
ReadFile
ReadConsoleW
GetFileAttributesExW
RaiseException
GetStringTypeW
MoveFileExW
SetEnvironmentVariableA
Sections
.text Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE