Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_0a4c1dff97b5b1ea3379d92fd8643f4d_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-20_0a4c1dff97b5b1ea3379d92fd8643f4d_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_0a4c1dff97b5b1ea3379d92fd8643f4d_bkransomware
-
Size
717KB
-
MD5
0a4c1dff97b5b1ea3379d92fd8643f4d
-
SHA1
ab3b455897e132ecf7ef01e8171a5cc9070d7e7b
-
SHA256
45f0723cc64f9c5281e63d31cdd1f3dbc43fa9e4db01ec807f152d338b2aaac6
-
SHA512
27ab0a47c2daf88ac008b25a25fba19f5f2cc473728ef86dc6e0d42b73c59e9f149e490212222c94cde4a5bda48d4e0ecec0d7ecfb3eb5fb6dc38ec1584554f0
-
SSDEEP
12288:3fVpmpcubi/oTVy9RbwamPYxXh0pRHoR4hh:vkMwpWxwFPYxi7oR4hh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-20_0a4c1dff97b5b1ea3379d92fd8643f4d_bkransomware
Files
-
2024-08-20_0a4c1dff97b5b1ea3379d92fd8643f4d_bkransomware.exe windows:5 windows x86 arch:x86
b72edf767df9268ecb836ad6e76dd02b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetDevCaps
timeBeginPeriod
timeEndPeriod
timeGetTime
comctl32
PropertySheetA
ImageList_AddMasked
ord17
InitCommonControlsEx
ImageList_Create
ord6
kernel32
lstrcmpiA
FindFirstFileA
FindNextFileA
GetProcAddress
LoadLibraryA
GetPrivateProfileSectionA
GetLastError
CreateDirectoryA
LocalFree
FormatMessageA
VirtualAlloc
VirtualProtect
TerminateThread
GetExitCodeThread
SuspendThread
ResumeThread
PulseEvent
ReleaseMutex
WaitForSingleObject
CreateEventA
DeleteFileA
QueryPerformanceCounter
GetFileSize
FreeLibrary
GetCurrentThread
SetThreadPriority
ExpandEnvironmentStringsA
LCMapStringW
CompareStringW
GetStringTypeW
CreateFileW
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
OutputDebugStringW
LoadLibraryExW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
DeleteFileW
ExitThread
FlushFileBuffers
CreateThread
FindClose
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetConsoleMode
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
MultiByteToWideChar
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetProcessHeap
GetStartupInfoW
DeleteCriticalSection
GetFileType
GetStdHandle
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
GetTimeZoneInformation
DecodePointer
EncodePointer
RaiseException
GetCommandLineA
IsProcessorFeaturePresent
IsDebuggerPresent
HeapReAlloc
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
ReadFile
CreateFileA
SetFilePointer
WriteFile
CreateMutexA
QueryPerformanceFrequency
CloseHandle
GetCPInfo
Sleep
VirtualFree
GetModuleFileNameA
lstrlenA
GetCurrentThreadId
WriteConsoleW
HeapSize
SetEndOfFile
SetEnvironmentVariableA
GetConsoleCP
user32
InsertMenuItemA
ModifyMenuA
CreateMenu
MsgWaitForMultipleObjects
PeekMessageA
GetWindowTextA
GetDlgItemInt
FillRect
InvalidateRect
DrawTextA
IsWindowVisible
IsWindow
LoadCursorA
SetRect
ShowCursor
AdjustWindowRectEx
ValidateRect
SetActiveWindow
SetMenuItemInfoA
GetMenuItemInfoA
RemoveMenu
InsertMenuA
EnableMenuItem
CheckMenuItem
DrawMenuBar
GetMenuState
SetMenu
GetMenu
TranslateAcceleratorA
LoadAcceleratorsA
MoveWindow
IsMenu
RegisterClassA
PostQuitMessage
IsDialogMessageA
LoadBitmapA
SetWindowLongA
GetWindowLongA
MapWindowPoints
GetCursorPos
MessageBoxA
GetWindowRect
GetClientRect
SetWindowTextA
SetForegroundWindow
TrackPopupMenu
DeleteMenu
GetSubMenu
DestroyMenu
LoadMenuA
GetSystemMetrics
IsWindowEnabled
EnableWindow
SetFocus
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
EndDialog
DialogBoxParamA
CreateDialogParamA
IsIconic
GetWindowPlacement
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
DefWindowProcA
PostMessageA
SendMessageA
GetMessagePos
DispatchMessageA
TranslateMessage
GetMessageA
LoadIconA
gdi32
SetBkMode
CreateSolidBrush
GetStockObject
DeleteObject
SetTextColor
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyA
shell32
DragFinish
DragAcceptFiles
ShellExecuteA
SHChangeNotify
SHGetPathFromIDListA
SHBrowseForFolderA
DragQueryFileA
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 439KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 126KB - Virtual size: 839KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ