Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_9949484c4449f8997d5e432fc55927ce_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-20_9949484c4449f8997d5e432fc55927ce_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_9949484c4449f8997d5e432fc55927ce_bkransomware
-
Size
6.6MB
-
MD5
9949484c4449f8997d5e432fc55927ce
-
SHA1
fe3b83bc7dcf9809dd531d2661a1add1e97ed041
-
SHA256
6aa87bc19877e6beefb39781122a70aeedc8bf91c3ae8915d2700ee95d876a71
-
SHA512
1434e03e1441326052fca3777d773ceac98131cdba18d937c2808bd5d31e47aba6aaff9231b3723d8e73bd6cef86efada7b1f222f7b1b9b82b74fcae79091340
-
SSDEEP
98304:jXbxXe6IEQDVSne/mLfFFkZ0iTBakq8PRKHWZECC0/qajW48Br3tqcrL6HLV8ZF/:jVQ7hcGQMmknVEajt8x3YcrL6HZ8iwe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-20_9949484c4449f8997d5e432fc55927ce_bkransomware
Files
-
2024-08-20_9949484c4449f8997d5e432fc55927ce_bkransomware.exe windows:6 windows x86 arch:x86
1893fd854748f33a3aec3634f6662d07
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
QueryDepthSList
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
GetVersion
GetWindowsDirectoryW
GetThreadPriority
EnumResourceTypesW
GetFullPathNameW
GetExitCodeThread
GetLastError
GetTempPathW
SetThreadPriority
FileTimeToSystemTime
HeapDestroy
SizeofResource
Sleep
GetSystemDirectoryW
GetPrivateProfileStringW
CompareFileTime
VerSetConditionMask
SystemTimeToFileTime
LoadResource
SetFilePointer
EncodePointer
lstrcpyW
SuspendThread
WinExec
IsDebuggerPresent
GetSystemInfo
LockResource
VirtualAlloc
GetCPInfoExW
VerifyVersionInfoW
GetFileAttributesW
HeapCreate
GetUserDefaultLangID
EnumCalendarInfoW
SystemTimeToTzSpecificLocalTime
SetErrorMode
ExitProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
DecodePointer
DeleteCriticalSection
LeaveCriticalSection
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetSystemTimeAsFileTime
EnterCriticalSection
CreateFileW
user32
ShowOwnedPopups
SetCursor
HideCaret
CharUpperBuffW
CreateDialogParamA
GetMessageW
SetCapture
GetSubMenu
DeleteMenu
RemovePropA
MessageBeep
GetMenuStringW
DrawTextExW
SetFocus
GetWindowTextLengthA
SetScrollRange
GetQueueStatus
GetCapture
GetMenu
OffsetRect
SetPropA
GetScrollInfo
MessageBoxA
LoadMenuW
GetWindowLongW
GetClassNameW
MonitorFromWindow
EndDialog
SetWindowsHookExA
SendDlgItemMessageW
ShowWindow
GetSysColorBrush
IsWindow
RemoveMenu
FlashWindow
CreateWindowExW
ReleaseCapture
RegisterClassW
GetKeyboardState
GetDlgItemTextW
SetDlgItemTextW
SendMessageW
UpdateWindow
GetDlgItemTextA
GetCaretBlinkTime
GetMonitorInfoW
CheckMenuItem
GetWindow
DialogBoxParamA
EndPaint
GetMessageA
SetWindowRgn
GetSystemMenu
MapDialogRect
CharNextW
TrackPopupMenu
RegisterWindowMessageW
MsgWaitForMultipleObjects
GetParent
LoadIconA
SetParent
DrawEdge
GetMenuItemInfoW
WaitMessage
GetDC
GetKeyboardLayout
GetWindowLongA
PeekMessageA
SetClassLongA
GetDlgItem
CharUpperW
DefWindowProcA
GetDesktopWindow
GetSysColor
CreateCaret
GetKeyboardType
SystemParametersInfoA
GetSystemMetrics
InsertMenuA
EnableWindow
GetDlgCtrlID
SetWindowTextW
SetMenuItemInfoW
SetScrollInfo
ValidateRect
GetMessageTime
RegisterClassA
SetWindowTextA
gdi32
MoveToEx
EndPage
BitBlt
GetWindowOrgEx
PatBlt
CreateFontIndirectA
SetBkColor
CreatePalette
CreateBitmap
DeleteObject
CreateBrushIndirect
CreateRectRgn
GetCharABCWidthsFloatA
GetSystemPaletteEntries
CreatePen
IntersectClipRect
GetPixel
UpdateColors
GetBitmapBits
ExtCreatePen
GetTextExtentPoint32A
LineTo
MaskBlt
DeleteDC
GetDeviceCaps
GetDIBits
SetPixel
SelectObject
SelectClipRgn
CreatePenIndirect
PolyPolyline
CreateRectRgnIndirect
CreateCompatibleBitmap
GetObjectType
GetTextExtentPointA
GetClipBox
SetTextAlign
GetStockObject
RoundRect
advapi32
ControlService
GetLengthSid
AllocateAndInitializeSid
ChangeServiceConfigW
RegConnectRegistryW
RegGetKeySecurity
RegQueryInfoKeyW
CopySid
OpenServiceW
OpenSCManagerW
GetUserNameA
StartServiceW
InitializeSecurityDescriptor
EqualSid
CloseServiceHandle
shell32
ExtractIconExW
ShellExecuteExW
oleaut32
SysFreeString
VariantInit
SysAllocStringLen
SafeArrayCreate
VariantCopy
Sections
.text Size: 662KB - Virtual size: 661KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lqp Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ