Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_f0a0a2257860117d4870cca515e1c9d3_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-24_f0a0a2257860117d4870cca515e1c9d3_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_f0a0a2257860117d4870cca515e1c9d3_bkransomware
-
Size
522KB
-
MD5
f0a0a2257860117d4870cca515e1c9d3
-
SHA1
5df07a8f96405ab54e75097b181681eae48c4f7a
-
SHA256
4723e9f442e611a602c8122ebb22576464d43562962e78544677b5372840d0f3
-
SHA512
8ab55754f8801e2b77cd23a5d2144079f4bd9e3dd78de4fb1199425893269fe8d538836724c80274b5edb4893e718bf145b571b32f426f6586c66723ecdee89c
-
SSDEEP
6144:82bgAmys5frTdPzv8m49up2UK/4S6woxU4ULw148ITYWdrfWZZ5e:lDmysBZPzE7ZUKiwjZLw148wRfI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-24_f0a0a2257860117d4870cca515e1c9d3_bkransomware
Files
-
2024-08-24_f0a0a2257860117d4870cca515e1c9d3_bkransomware.exe windows:5 windows x86 arch:x86
909d9b5d419f41b0a733b3690ae9fb6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
GetGraphicsMode
GetTextCharacterExtra
SetTextAlign
GetTextCharsetInfo
GetCurrentObject
GetPixelFormat
GetMapMode
SetSystemPaletteUse
GetPolyFillMode
GetClipRgn
user32
GetForegroundWindow
MoveWindow
SetDlgItemTextA
CheckDlgButton
GetMenuState
GetWindowLongA
IsWindowUnicode
GetWindowDC
ShowWindow
IsWindowEnabled
GetMenuItemID
RemovePropA
GetInputState
SendMessageA
EnableWindow
GetMenu
CallWindowProcA
LoadIconA
BeginPaint
SetWindowTextA
GetDlgItem
GetCursor
GetScrollPos
GetWindowContextHelpId
GetMenuContextHelpId
WindowFromDC
PostMessageA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetProcAddress
GetTickCount
GetLastError
SetFilePointer
GetProcessHeap
GetCurrentProcessId
FindClose
GetCurrentProcess
QueryPerformanceCounter
GetDriveTypeA
LockResource
GetVersion
FlushFileBuffers
GetCurrentThreadId
LocalFlags
GlobalSize
MoveFileA
IsDebuggerPresent
GetModuleHandleA
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
IsProcessorFeaturePresent
GetStdHandle
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
SetLastError
GetCurrentThread
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileType
GetModuleFileNameA
SetEnvironmentVariableA
Sections
.text Size: 444KB - Virtual size: 443KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE