Static task
static1
Behavioral task
behavioral1
Sample
20240824af868fc62548250a95f2e328cb950150bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
20240824af868fc62548250a95f2e328cb950150bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
20240824af868fc62548250a95f2e328cb950150bkransomware
-
Size
6.8MB
-
MD5
af868fc62548250a95f2e328cb950150
-
SHA1
42e6af349cfb5df76383efc400f2e1fd96f5ba36
-
SHA256
36f784f9ec5cf42a32d1b196e54adca888ca35fa6e81fa43ccd579153279fd45
-
SHA512
d18650cd89ce7f100a546acff6eea7850bcb7d13fbe760788b8610bb70323886cf6e9640c12aa38bfd00765dcbc516cb783c12c149675d8f191b7834e7ab3895
-
SSDEEP
196608:RSlJZ2UtiKhEdzhHOI6N3C1dHw0k0WW2mH5c:8l9tZENhHOI6N3Cf1rWoi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20240824af868fc62548250a95f2e328cb950150bkransomware
Files
-
20240824af868fc62548250a95f2e328cb950150bkransomware.exe windows:6 windows x86 arch:x86
9c2c8f2388aa5eb79bc8016ac4e4fbb6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapAlloc
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
RtlUnwind
RaiseException
GetCommandLineW
HeapFree
HeapReAlloc
GetLastError
GetStringTypeW
MultiByteToWideChar
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
DecodePointer
GetSystemTimeAsFileTime
GetExitCodeThread
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
SetStdHandle
WriteConsoleW
ReadConsoleW
LoadLibraryW
CreateFileW
SwitchToThread
ResumeThread
GetVersion
GetSystemInfo
DeviceIoControl
GetFullPathNameW
QueryDosDeviceW
LockResource
VirtualAlloc
GetThreadLocale
VerifyVersionInfoW
GetFileAttributesW
lstrcpynW
GetExitCodeProcess
HeapDestroy
GetVersionExW
ReadProcessMemory
Sleep
VirtualQueryEx
GetLogicalDrives
SignalObjectAndWait
GetUserDefaultLCID
CreateDirectoryW
CompareFileTime
EnumCalendarInfoW
SystemTimeToTzSpecificLocalTime
LoadResource
GetDriveTypeW
GetFileSize
EnumResourceNamesW
GetSystemDefaultLangID
SuspendThread
GetUserDefaultUILanguage
RemoveDirectoryW
GetCPInfoExW
GetPrivateProfileIntW
GetTempPathW
SetThreadPriority
ExitThread
FormatMessageW
SizeofResource
GetSystemDirectoryW
FindResourceW
RtlCaptureContext
SetFilePointer
FindFirstFileW
EncodePointer
ChangeTimerQueueTimer
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
CloseHandle
WideCharToMultiByte
user32
SystemParametersInfoA
SetCursor
GetDlgItemInt
SetTimer
GetWindowRect
CharUpperBuffW
CreateDialogParamA
GetMessageW
PostQuitMessage
CharNextW
TrackPopupMenu
RegisterWindowMessageW
SetCapture
IsZoomed
GetSubMenu
GetParent
SetParent
CreateMenu
DrawTextExW
GetMenuItemInfoW
GetDoubleClickTime
WaitMessage
GetCapture
GetMenu
OffsetRect
GetWindowTextA
GetKeyboardLayout
MessageBoxA
InvalidateRect
LoadMenuW
UnregisterClassA
GetWindowLongA
PeekMessageA
ReleaseDC
DefWindowProcA
SetWindowsHookExA
RedrawWindow
SendDlgItemMessageW
ShowWindow
SetMenu
CreatePopupMenu
AppendMenuA
PostMessageA
SetScrollInfo
FlashWindow
CreateWindowExW
CheckRadioButton
InsertMenuW
RemoveMenu
ScrollWindowEx
RegisterClassW
SetCaretPos
GetDlgItemTextW
SetDlgItemTextW
SendMessageW
MapWindowPoints
UpdateWindow
EnableWindow
GetDlgCtrlID
DialogBoxParamA
SetDlgItemTextA
ValidateRect
GetMonitorInfoW
CheckMenuItem
TranslateMDISysAccel
GetMessageTime
RegisterClassA
GetWindow
MapDialogRect
ToAsciiEx
DestroyWindow
SetWindowRgn
HideCaret
SendDlgItemMessageA
KillTimer
AttachThreadInput
LoadIconA
RemovePropA
GetClientRect
ModifyMenuW
SetScrollRange
GetDC
GetQueueStatus
SetDlgItemInt
SetWindowLongA
GetWindowTextW
SetScrollPos
GetClassNameW
MonitorFromWindow
SetClassLongA
GetDlgItem
ScrollWindow
SetWindowLongW
DestroyCaret
GetDesktopWindow
EnumChildWindows
IsDlgButtonChecked
IsWindow
GetKeyboardType
GetSystemMetrics
SetWindowTextA
gdi32
GetBitmapBits
ExtCreatePen
MoveToEx
GetTextExtentPoint32W
LineTo
SetTextColor
DeleteDC
CreateHalftonePalette
SetPixel
CreateBitmap
DeleteObject
Rectangle
GetObjectType
GetCurrentPositionEx
GetCharABCWidthsFloatA
Polyline
GetClipBox
IntersectClipRect
CreateDIBitmap
GetPixel
EndDoc
ExtTextOutA
UpdateColors
BitBlt
GetWindowOrgEx
MaskBlt
CreatePalette
SelectObject
GetPaletteEntries
CreatePenIndirect
CreateCompatibleDC
CreateRectRgnIndirect
SetMapMode
CreateCompatibleBitmap
CreateBrushIndirect
SaveDC
GetDIBColorTable
GetTextExtentExPointA
RectVisible
RoundRect
SetTextAlign
GetStockObject
RestoreDC
CreateSolidBrush
TextOutA
PatBlt
comdlg32
FindTextW
GetOpenFileNameW
advapi32
RegEnumKeyExW
ControlService
GetUserNameA
RegSetKeySecurity
AllocateAndInitializeSid
ChangeServiceConfigW
RegConnectRegistryW
QueryServiceStatus
RegGetKeySecurity
RegQueryInfoKeyW
OpenSCManagerW
CloseServiceHandle
shell32
CommandLineToArgvW
SHGetFileInfoW
ShellExecuteExW
ShellExecuteW
ole32
CoInitialize
oleaut32
VariantInit
VariantChangeType
SafeArrayPtrOfIndex
SafeArrayGetUBound
SysReAllocStringLen
VariantClear
SysAllocStringLen
SysFreeString
SafeArrayCreate
Sections
.text Size: 772KB - Virtual size: 772KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xUXCh Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ