Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_92bb0ff7e0068236bcb655a43ac2393f_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-20_92bb0ff7e0068236bcb655a43ac2393f_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_92bb0ff7e0068236bcb655a43ac2393f_bkransomware
-
Size
6.7MB
-
MD5
92bb0ff7e0068236bcb655a43ac2393f
-
SHA1
ceaaaf52178ad74f73b9b84cec609a1b2f56f1a3
-
SHA256
c717403425b8a3e88c27b521a3232b5e9a5f28a44df1f797d70402f70e1bec26
-
SHA512
5862a7e7a992a822a61dfcae7521af69ab0e77f8d1211ea9972b3ef86707c959d171d825c8e5580bd772c146b360bb2f41aafe54f5af6f1a590845c829e57cbb
-
SSDEEP
196608:/ZDG5M28HeAsFELLj8IVZQqdn9siF/eF3n9861f:VGd8+AsFmfXLFdnuiMNu6h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-20_92bb0ff7e0068236bcb655a43ac2393f_bkransomware
Files
-
2024-08-20_92bb0ff7e0068236bcb655a43ac2393f_bkransomware.exe windows:6 windows x86 arch:x86
ec14f788c01f77a400d718f4d825623b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultUILanguage
SetErrorMode
FreeLibrary
LoadResource
SystemTimeToTzSpecificLocalTime
SetDllDirectoryW
GetCurrentProcess
GetEnvironmentStringsW
HeapFree
GetModuleHandleExW
WaitForSingleObject
ConnectNamedPipe
WaitForSingleObjectEx
GetCurrentThread
OpenProcess
GetSystemDirectoryW
LoadLibraryW
Sleep
SizeofResource
FormatMessageW
GetSystemTimeAdjustment
GetExitCodeProcess
lstrcpynW
IsProcessorFeaturePresent
Beep
MulDiv
CreateProcessA
FileTimeToSystemTime
GetSystemDirectoryA
GetTimeZoneInformation
CreateFileW
CompareStringW
GetACP
ExitThread
GetStartupInfoW
FlushFileBuffers
GetPrivateProfileIntW
VerifyVersionInfoW
FindFirstFileA
SetLastError
VirtualAlloc
CreateNamedPipeA
IsValidCodePage
FindClose
ResetEvent
GetLocalTime
GetExitCodeThread
RemoveDirectoryW
GetModuleFileNameA
GetOEMCP
GetStringTypeW
VirtualProtect
GetWindowsDirectoryW
GetDriveTypeW
GetCurrentProcessId
LocalFree
GetSystemTime
EnumSystemLocalesW
CreateThread
SwitchToThread
ReadConsoleW
WriteConsoleW
SetStdHandle
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
FreeEnvironmentStringsW
WriteFile
GetFileType
GetStdHandle
GetProcessHeap
HeapSize
ExitProcess
IsValidLocale
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
UnmapViewOfFile
SetFilePointer
FindFirstFileW
GetFileSize
GetDateFormatW
EncodePointer
SuspendThread
TlsFree
WinExec
IsDebuggerPresent
EnumResourceTypesW
LockResource
GlobalFree
IsDBCSLeadByteEx
SetThreadLocale
RaiseException
GetModuleFileNameW
CreateEventA
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetLocaleInfoW
GetCommandLineA
GetUserDefaultLangID
GetWindowsDirectoryA
GetPrivateProfileStringW
GetUserDefaultLCID
QueryPerformanceCounter
WaitNamedPipeA
EnumCalendarInfoW
VirtualQuery
GetCPInfo
MapViewOfFile
GetVersion
TlsGetValue
SetEvent
CreateTimerQueue
HeapAlloc
LoadLibraryExW
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
WideCharToMultiByte
CloseHandle
DuplicateHandle
GetCurrentThreadId
GetSystemTimeAsFileTime
DecodePointer
EnterCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetLastError
HeapReAlloc
GetCommandLineW
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateEventW
TerminateProcess
TlsAlloc
TlsSetValue
GetTickCount
user32
ClientToScreen
DestroyAcceleratorTable
GetMessageW
CharNextW
IsIconic
GetMenuStringW
DrawTextExW
ModifyMenuW
EnumWindows
InflateRect
GetMenu
MessageBoxA
GetWindowTextW
GetClassNameW
MonitorFromWindow
CharUpperW
SetWindowLongW
DestroyCursor
SendDlgItemMessageW
ShowWindow
DrawMenuBar
EnableScrollBar
CreateWindowExW
SetDlgItemTextW
SendMessageW
UpdateWindow
DestroyMenu
GetWindowThreadProcessId
GetWindow
IsRectEmpty
DrawIconEx
GetDC
DrawFocusRect
DrawStateW
GetDesktopWindow
EnumChildWindows
GetSysColorBrush
GetMenuItemCount
InsertMenuW
MessageBoxW
MapWindowPoints
EndMenu
GetDlgCtrlID
DestroyIcon
CreateIconIndirect
gdi32
Arc
ExtFloodFill
GetRegionData
SetPolyFillMode
GetTextExtentPointW
GetBkColor
GetObjectW
SetStretchBltMode
CreatePatternBrush
SetROP2
CreateEnhMetaFileW
GetMetaFileBitsEx
CreateHatchBrush
Polygon
CreateFontIndirectW
PlayEnhMetaFile
StretchDIBits
PolyPolygon
comdlg32
GetSaveFileNameW
FindTextW
advapi32
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueExW
OpenServiceW
RegCloseKey
ChangeServiceConfigW
RegConnectRegistryW
LookupPrivilegeValueW
OpenSCManagerW
AdjustTokenPrivileges
shell32
ShellExecuteExW
CommandLineToArgvW
ExtractIconExW
oleaut32
SafeArrayPtrOfIndex
VariantChangeType
VariantInit
VariantClear
SysReAllocStringLen
Sections
.text Size: 678KB - Virtual size: 677KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bKac Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ