Static task
static1
Behavioral task
behavioral1
Sample
2024-08-22_8faea087375bf0322589801d7d4a5e30_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-22_8faea087375bf0322589801d7d4a5e30_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-22_8faea087375bf0322589801d7d4a5e30_bkransomware
-
Size
504KB
-
MD5
8faea087375bf0322589801d7d4a5e30
-
SHA1
86bfac2c5b09274ed2c8ebe91336695ef411786d
-
SHA256
a519d53b519284437be94de4c6b0b4e27912dfdfa1dd07b820053faa3e5a2562
-
SHA512
0fa481b424ab81672e3a3fe14715dcdaaaf7f04903dc0fc8dc6572f8bb07769e7d3ea13df66eeb5d4f8504f943780348d15f879b63ffb5168497778866619a3c
-
SSDEEP
12288:61XK1wZnCA2wZbS2hA4GMuoEGoPIgz5Eu4b:AK1wZnCA2wNSsPaGoAg1EuS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-22_8faea087375bf0322589801d7d4a5e30_bkransomware
Files
-
2024-08-22_8faea087375bf0322589801d7d4a5e30_bkransomware.exe windows:5 windows x86 arch:x86
54e4ed88eae40b9198b97cdcf320e41f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
GetMapMode
GetClipRgn
GetMetaRgn
GetNearestColor
GetBkColor
GetPixelFormat
GetFontUnicodeRanges
GetTextCharsetInfo
GetTextCharset
GetSystemPaletteUse
SetTextJustification
GetDCBrushColor
GetCurrentObject
GetStretchBltMode
SetSystemPaletteUse
GetNearestPaletteIndex
GetTextCharacterExtra
user32
CallWindowProcA
MoveWindow
CheckDlgButton
EndDialog
LoadIconA
GetWindowLongA
EndPaint
GetMenuState
RemovePropA
GetScrollPos
GetWindowDC
GetInputState
GetMenu
PostMessageA
SetFocus
IsWindowUnicode
DrawTextA
IsWindowEnabled
GetCursor
GetPropA
ShowWindow
GetMenuContextHelpId
SetDlgItemTextA
GetDlgItem
BeginPaint
GetMenuItemID
WindowFromDC
GetForegroundWindow
SendMessageA
EnableWindow
GetQueueStatus
SetWindowTextA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
GetProcAddress
GetModuleHandleA
IsProcessorFeaturePresent
SetFilePointer
GetTickCount
LocalFlags
LockResource
CloseHandle
GetDriveTypeA
FindClose
GetCurrentProcess
MoveFileA
GetVersion
IsDebuggerPresent
GetLastError
GlobalSize
GlobalHandle
GetCurrentThreadId
GetCurrentProcessId
DeleteFileA
FindResourceA
GetFileTime
GetStdHandle
GetFileType
GlobalFlags
FlushFileBuffers
WriteFile
GetProcessHeap
GlobalAlloc
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetConsoleCP
GetConsoleMode
FindFirstFileExW
SetEnvironmentVariableA
Sections
.text Size: 455KB - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE