Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_50559f2b65f6f006690445c43b1c96b0_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-18_50559f2b65f6f006690445c43b1c96b0_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_50559f2b65f6f006690445c43b1c96b0_bkransomware
-
Size
624KB
-
MD5
50559f2b65f6f006690445c43b1c96b0
-
SHA1
f10b4369e089be0ee8676d64cad67c50effd4f78
-
SHA256
6686bb1756786e3efdbd69b4eb13cea68618a790fa522a0c793c6dd9583c87da
-
SHA512
d1c5b7a80215593a226af7e04cc370dd6b6ca253ce63aa0d369f40e4f1894334b1b52aceacb6cacf46327fabf825a590c11a79b6aae8dc0ceeac55f0b2c2a21d
-
SSDEEP
12288:cIwU1YoeGjJqkglaMhZW/XckTownYWvpMx+DMuNiH4dIyZTT6i:Z1y0+laMvW/xTowYWvTgOYsTTR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-18_50559f2b65f6f006690445c43b1c96b0_bkransomware
Files
-
2024-08-18_50559f2b65f6f006690445c43b1c96b0_bkransomware.exe windows:5 windows x86 arch:x86
268ce4cf75b58b38047b9c65fd25f063
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
DuplicateHandle
GetCurrentProcess
CreateProcessW
GetLocalTime
GetTimeZoneInformation
GetCommandLineA
IsProcessorFeaturePresent
GetProcessHeap
GetStdHandle
WriteFile
GetModuleFileNameW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
RtlUnwind
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ReadFile
ReadConsoleW
GetFullPathNameA
RaiseException
GetFileType
GetStringTypeW
SetFilePointerEx
CreatePipe
GetFileAttributesExW
CreateProcessA
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
HeapSize
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
WriteConsoleW
FlushFileBuffers
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFullPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
SetEnvironmentVariableA
WaitForSingleObject
GetExitCodeProcess
SetEndOfFile
SetEnvironmentVariableW
Sections
.text Size: 508KB - Virtual size: 508KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ