Static task
static1
Behavioral task
behavioral1
Sample
2024-08-22_9006f09d2fc40639862dc7ae3ee792bf_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-22_9006f09d2fc40639862dc7ae3ee792bf_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-22_9006f09d2fc40639862dc7ae3ee792bf_bkransomware
-
Size
6.7MB
-
MD5
9006f09d2fc40639862dc7ae3ee792bf
-
SHA1
95b029d7a9a7d993c39583fb39cf64881e7baa19
-
SHA256
09d907131284c4c5d8f4d93d7385977cfcbd392942ac33cec3b4c551fdebb1a3
-
SHA512
7d663a07f370dde75524a55f198c70269c67c4e944f554938e2cebb18b9070a51c22ce255774b38c1a21ac8e054ebbcccfb593d151a64e2d2cc214ca1856d0c4
-
SSDEEP
196608:FWTSaGlzlHwFZ8wI1h+jR5wAynLsurbTWcPMU:dTHwFs+jR5wABh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-22_9006f09d2fc40639862dc7ae3ee792bf_bkransomware
Files
-
2024-08-22_9006f09d2fc40639862dc7ae3ee792bf_bkransomware.exe windows:6 windows x86 arch:x86
578830bf531e7d5550b8660a17b6b54a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetFileType
GetStdHandle
GetCPInfo
GetStringTypeW
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
TlsFree
TlsAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
DeleteCriticalSection
CreatePipe
CreateFileMappingA
LoadLibraryA
GlobalFree
EnterCriticalSection
GetCommandLineW
IsDBCSLeadByteEx
FindFirstFileA
GetStartupInfoW
GetSystemDirectoryA
Beep
Sleep
TlsSetValue
GetCommandLineA
ExpandEnvironmentStringsA
GetCurrentThread
WaitNamedPipeA
GetCommState
GlobalMemoryStatus
GetDateFormatW
ExitProcess
FlushFileBuffers
HeapFree
CreateThread
CloseHandle
FindNextFileA
GetOEMCP
CreateEventW
GetLocalTime
ResetEvent
GetACP
CompareStringW
GetTimeZoneInformation
GetModuleFileNameW
TerminateProcess
CreateProcessA
GetFileAttributesA
GetSystemTimeAdjustment
SetCommState
ClearCommBreak
WaitForSingleObjectEx
SetCommBreak
InitializeSListHead
LoadLibraryExW
TlsGetValue
CreateFileA
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetLastError
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
RaiseException
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateFileW
user32
ShowOwnedPopups
DestroyWindow
GetMessageA
SetWindowRgn
SetTimer
CreateDialogParamA
GetMessageW
SendDlgItemMessageA
IsZoomed
DrawEdge
EnumWindows
CreateIconIndirect
GetWindowPlacement
GetKeyboardLayout
SetRect
MessageBoxA
InvalidateRect
UnregisterClassA
SetScrollPos
ReleaseDC
GetDlgItem
EndDialog
RedrawWindow
GetSysColor
CheckDlgButton
ShowWindow
CreatePopupMenu
IsDlgButtonChecked
DrawMenuBar
CreateCaret
PostMessageA
CreateWindowExW
ScrollWindowEx
SendMessageW
UpdateWindow
DestroyIcon
CopyRect
HideCaret
MapDialogRect
IsIconic
SetKeyboardState
MsgWaitForMultipleObjects
RemovePropA
GetWindowInfo
CreateMenu
SetFocus
ShowCaret
SetScrollRange
GetDC
GetQueueStatus
DrawFocusRect
GetKeyboardState
OffsetRect
SystemParametersInfoW
PeekMessageA
SetClassLongA
DestroyCursor
GetDesktopWindow
SetMenu
AppendMenuA
RemoveMenu
FlashWindow
SystemParametersInfoA
SetWindowTextA
EndMenu
DestroyMenu
LoadCursorA
GetDlgItemTextA
GetCaretBlinkTime
DrawFrameControl
SetDlgItemTextA
EnableWindow
gdi32
CreatePolygonRgn
MoveToEx
GetWindowOrgEx
PatBlt
GetTextExtentPoint32A
LineTo
GetMetaFileBitsEx
MaskBlt
CreateFontA
CreateFontIndirectA
GetDIBits
GdiFlush
GetRgnBox
DeleteObject
SelectClipRgn
PtInRegion
PlayEnhMetaFile
CombineRgn
Rectangle
Ellipse
GetObjectType
GetBkColor
GetCurrentPositionEx
GetCharWidth32A
GetTextExtentPointA
CreatePatternBrush
CreatePen
RectVisible
SetTextAlign
CreateDIBitmap
ExtTextOutA
RestoreDC
PolyPolygon
SetTextColor
GetCharacterPlacementW
CopyEnhMetaFileA
CreateBitmap
GetPaletteEntries
CreateBrushIndirect
ExtCreateRegion
SetPolyFillMode
GetDIBColorTable
SetStretchBltMode
GetNearestPaletteIndex
GetSystemPaletteEntries
SetViewportExtEx
GetBitmapBits
advapi32
AllocateAndInitializeSid
RegQueryValueExW
CopySid
GetLengthSid
RegOpenKeyExA
SetSecurityDescriptorDacl
EqualSid
shell32
ShellExecuteExW
Sections
.text Size: 677KB - Virtual size: 677KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.REwrQ Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ