Static task
static1
Behavioral task
behavioral1
Sample
2024-08-23_bb2fc7200b29e88867c966ce6cba0136_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-23_bb2fc7200b29e88867c966ce6cba0136_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-23_bb2fc7200b29e88867c966ce6cba0136_bkransomware
-
Size
6.6MB
-
MD5
bb2fc7200b29e88867c966ce6cba0136
-
SHA1
da71dacc7d7d8e71b72868fd1d7005a73eb3c969
-
SHA256
a986696b2761992e274114f6c5b902c514a007b78d693c079f8290d6f7b3c2ac
-
SHA512
13c5e27ef66dc17be02367d84551148c9ffc18cf942f18147a3108979027871086dcbce696af3ad5a76823a754c8aec90f8a9e1300a511706ae0e7dbb5f76a05
-
SSDEEP
98304:JtExeeTPGM9lSxEanjETJb7RBk90+EbQuAjx7T4Pd/ube/VDNt5yVg89C1DL7kTE:wxvc1eBRBkIMNjxQQbUVhtAkFEy/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-23_bb2fc7200b29e88867c966ce6cba0136_bkransomware
Files
-
2024-08-23_bb2fc7200b29e88867c966ce6cba0136_bkransomware.exe windows:6 windows x86 arch:x86
7e28ba6fe8811dd2b20ee6b9895f45ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
GetFileSize
GlobalMemoryStatus
TlsGetValue
RtlCaptureContext
MapViewOfFile
UnmapViewOfFile
VirtualQuery
FindResourceW
FreeLibrary
SystemTimeToFileTime
GetCommState
GetModuleHandleExW
GlobalLock
WaitForSingleObject
SignalObjectAndWait
GetWindowsDirectoryA
GetCommandLineA
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
Sleep
ReadProcessMemory
HeapDestroy
GetFileAttributesA
IsProcessorFeaturePresent
GetFileAttributesW
TerminateProcess
GetModuleFileNameW
GetSystemDirectoryA
CreateFileW
CompareStringW
GetACP
MultiByteToWideChar
GetTempPathW
FindFirstFileA
EnterCriticalSection
GlobalFree
LoadLibraryA
DeviceIoControl
GetSystemInfo
CreatePipe
FindNextFileA
IsDebuggerPresent
FindNextFileW
VirtualProtect
FileTimeToLocalFileTime
GetCurrentProcessId
OpenFileMappingA
GetTempFileNameW
SwitchToThread
SetStdHandle
LoadLibraryW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
QueryPerformanceCounter
WriteFile
GetStdHandle
GetCPInfo
GetOEMCP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
UnregisterWait
WriteConsoleW
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
GetCommandLineW
ExitProcess
GetFullPathNameW
TlsFree
GetThreadTimes
GetWindowsDirectoryW
WinExec
GetThreadPriority
GetModuleFileNameA
EnumResourceTypesW
RemoveDirectoryW
GetFileType
CreateFileMappingA
ResetEvent
FindClose
SetLastError
GetLastError
GetCPInfoExW
VerifyVersionInfoW
FlushFileBuffers
SetThreadPriority
GetTimeZoneInformation
GetExitCodeProcess
CreateProcessA
GetSystemTimeAdjustment
FormatMessageW
SetCommTimeouts
OpenProcess
SetCommState
VirtualQueryEx
GetPrivateProfileStringW
GetSystemTimeAsFileTime
VirtualFree
GetTickCount
SetCommBreak
SetHandleInformation
GetEnvironmentStringsW
SetEnvironmentVariableW
WaitNamedPipeA
VerSetConditionMask
LoadLibraryExW
LoadResource
CreateThread
FindFirstFileW
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
CloseHandle
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
HeapReAlloc
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateEventW
TlsAlloc
TlsSetValue
GetStartupInfoW
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
ExitThread
HeapFree
user32
ClientToScreen
DestroyAcceleratorTable
CharUpperBuffW
GetMenuStringW
EnumWindows
DrawFocusRect
CreateDialogIndirectParamA
CheckMenuRadioItem
MessageBoxA
LoadMenuW
GetWindowTextW
DestroyCursor
EnumChildWindows
ShowWindow
GetSysColorBrush
DrawMenuBar
EnableScrollBar
CreateWindowExW
GetDlgItemTextW
SendMessageW
UpdateWindow
GetDlgCtrlID
ToUnicode
DestroyIcon
DrawFrameControl
SetMenuItemInfoW
GetMonitorInfoW
CopyRect
GetDlgItemInt
GetSubMenu
LoadStringA
AttachThreadInput
ModifyMenuW
CreateIconIndirect
GetDC
InflateRect
SetDlgItemInt
GetMenu
GetWindowLongW
CharUpperW
SetWindowLongW
GetDesktopWindow
EndMenu
DestroyMenu
GetMessageW
gdi32
PolyPolygon
SetLayout
GetTextExtentPoint32W
GetRgnBox
GetEnhMetaFileHeader
CombineRgn
ExtCreateRegion
GetTextExtentPointW
GetBkColor
GetCharABCWidthsW
GetNearestPaletteIndex
CloseEnhMetaFile
CreateEnhMetaFileW
GetMetaFileBitsEx
Polygon
CreateFontIndirectW
PlayEnhMetaFile
Ellipse
CreateBitmapIndirect
GetObjectW
SetViewportExtEx
SetROP2
SetWindowOrgEx
comdlg32
FindTextW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegCloseKey
AdjustTokenPrivileges
RegDeleteValueA
QueryServiceStatus
RegGetKeySecurity
LookupPrivilegeValueW
RegQueryValueExW
RegEnumKeyExW
ChangeServiceConfigW
RegOpenKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
OpenServiceW
OpenSCManagerW
RegUnLoadKeyW
shell32
ShellExecuteW
SHGetFileInfoW
ShellExecuteExW
oleaut32
VariantChangeType
VariantCopy
SysReAllocStringLen
Sections
.text Size: 654KB - Virtual size: 653KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.MmHVb Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ