Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_c89dcd2129ad6db47f76f6af46f95a5d_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-18_c89dcd2129ad6db47f76f6af46f95a5d_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_c89dcd2129ad6db47f76f6af46f95a5d_bkransomware
-
Size
635KB
-
MD5
c89dcd2129ad6db47f76f6af46f95a5d
-
SHA1
c88c06fcb9a2489a4b89f8c11c28ed7e132a3e86
-
SHA256
6ec2b0c4e31fe72f94500322300c6a25aa6eccab70a5b6c3601448524e47fd21
-
SHA512
e9008612f4962f617edad66e8cabb67131e5521cfe9b06c98b833bbd060c98f5a4ff38ca4f4af931b7ead16c78d389414badd1e85d0da57c111f15dcab0d8d4c
-
SSDEEP
12288:sXTsZiVGMzsS46DHXJBAwLLNzruMFUE1:oTMiVVzsS46D3/VLFruM/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-18_c89dcd2129ad6db47f76f6af46f95a5d_bkransomware
Files
-
2024-08-18_c89dcd2129ad6db47f76f6af46f95a5d_bkransomware.exe windows:5 windows x86 arch:x86
65491b81a0c6014a760f49283c02f405
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetTimeZoneInformation
GetLocalTime
GetFullPathNameW
CloseHandle
DuplicateHandle
GetCurrentProcess
CreateProcessA
GetFullPathNameA
Beep
Sleep
GetCommandLineA
IsProcessorFeaturePresent
GetProcessHeap
GetStdHandle
WriteFile
GetModuleFileNameW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
SetLastError
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
DeleteFileW
RaiseException
GetFileType
FlushFileBuffers
SetStdHandle
GetStringTypeW
SetEnvironmentVariableA
SetEnvironmentVariableW
WaitForSingleObject
GetExitCodeProcess
CreatePipe
SetFilePointerEx
ReadFile
ReadConsoleW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
OutputDebugStringW
WriteConsoleW
HeapSize
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
GetFileAttributesExW
SetEndOfFile
Sections
.text Size: 504KB - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ