Static task
static1
Behavioral task
behavioral1
Sample
2024-08-26_932a666470cf9654cbf7a9b35c004b0e_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-26_932a666470cf9654cbf7a9b35c004b0e_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-26_932a666470cf9654cbf7a9b35c004b0e_bkransomware
-
Size
6.7MB
-
MD5
932a666470cf9654cbf7a9b35c004b0e
-
SHA1
9e3bfd8810e901fa5fee63706c1244c792aabdd8
-
SHA256
25572022fb95d7264ebce4f045397540be7586e0cb2fff4769a319a56852a197
-
SHA512
841fbefb8a1bc62fcb730a525b51a297b9270414262027d35795d5b37583650b2860acfe289551bf175a00029f6f9c5e4bab91e8cc45d9f68f8181a7fbe660f8
-
SSDEEP
196608:RlDcb0eHs3/Sa06+A+un/PGzknv4uP2vNrx1w:DzN3qaUA+QQknv4uell1w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-26_932a666470cf9654cbf7a9b35c004b0e_bkransomware
Files
-
2024-08-26_932a666470cf9654cbf7a9b35c004b0e_bkransomware.exe windows:6 windows x86 arch:x86
38dc61e83929119da11c8a98c0901d0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetTempFileNameW
SetErrorMode
FreeLibrary
SystemTimeToTzSpecificLocalTime
WaitNamedPipeA
CompareFileTime
InitializeSListHead
HeapFree
SignalObjectAndWait
ExpandEnvironmentStringsA
GetPrivateProfileStringW
GetProcessTimes
GetConsoleCP
WideCharToMultiByte
IsValidLocale
Sleep
SizeofResource
ReadProcessMemory
FormatMessageW
GetSystemTimeAdjustment
HeapDestroy
GetFileAttributesA
Beep
GetFileAttributesW
GetTimeZoneInformation
GetOverlappedResult
FlushFileBuffers
RaiseException
FindFirstFileA
GetThreadLocale
VirtualAlloc
EnterCriticalSection
GetDiskFreeSpaceW
CreateFileMappingA
GetExitCodeThread
CreateEventW
RemoveDirectoryW
GetModuleFileNameA
GetStringTypeW
DeleteCriticalSection
GetWindowsDirectoryW
FileTimeToLocalFileTime
SuspendThread
SwitchToThread
TerminateProcess
SetStdHandle
SetFilePointerEx
GetConsoleMode
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetStdHandle
GetCPInfo
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
ResumeThread
ExitProcess
LocalFree
OpenFileMappingA
DeleteFileW
CloseHandle
WinExec
FindNextFileW
GetOEMCP
CreatePipe
QueryDosDeviceW
GetFileType
GetLastError
GetPrivateProfileIntW
WritePrivateProfileStringW
SetThreadPriority
CompareStringW
MulDiv
lstrcpynW
GetExitCodeProcess
GetVersionExW
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetUserDefaultLangID
ClearCommBreak
WaitForSingleObject
GetUserDefaultLCID
GlobalLock
CreateDirectoryW
GetCurrentProcess
LoadResource
SetEndOfFile
GetSystemDefaultUILanguage
UnmapViewOfFile
TlsGetValue
SetFilePointer
FindFirstFileW
GlobalMemoryStatus
GetFileSize
GetEnvironmentVariableW
EncodePointer
WriteConsoleW
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
LoadLibraryExW
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
DuplicateHandle
GetCurrentThread
GetCurrentThreadId
GetSystemTimeAsFileTime
LeaveCriticalSection
DecodePointer
HeapReAlloc
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TlsAlloc
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateFileW
user32
GetWindow
DestroyIcon
GetMessageW
GetKeyState
DrawTextExW
GetMenuItemInfoW
CreateIconIndirect
GetMenu
CheckMenuRadioItem
MessageBoxA
CharUpperW
SetWindowLongW
EnumChildWindows
ShowWindow
CreateWindowExW
BeginDeferWindowPos
GetDlgItemTextW
SetMenuItemInfoW
ValidateRgn
SendMessageW
UpdateWindow
SetDlgItemTextW
GetMonitorInfoW
CheckMenuItem
CopyRect
IsRectEmpty
GetDlgItemInt
DestroyAcceleratorTable
IsIconic
DrawIconEx
LoadStringA
AttachThreadInput
CharLowerBuffW
ModifyMenuW
GetDC
GetWindowLongW
GetClassNameW
SendDlgItemMessageW
GetDesktopWindow
GetSysColorBrush
EnableScrollBar
InsertMenuW
EndMenu
GetDlgCtrlID
SetWindowTextW
ToUnicode
gdi32
SetLayout
ExtFloodFill
SetTextColor
StretchBlt
OffsetRgn
SetPolyFillMode
GetTextExtentPointW
GetBkColor
CreateBitmapIndirect
GetObjectW
GetCharABCWidthsW
GetNearestPaletteIndex
CreateEnhMetaFileW
CreatePolygonRgn
SetViewportOrgEx
Polygon
GetRgnBox
GetRegionData
CombineRgn
RectInRegion
SetStretchBltMode
StretchDIBits
comdlg32
FindTextW
GetOpenFileNameW
advapi32
AdjustTokenPrivileges
RegOpenKeyExW
SetSecurityDescriptorOwner
RegDeleteValueA
ChangeServiceConfigW
SetSecurityDescriptorDacl
RegDeleteKeyA
OpenProcessToken
CloseServiceHandle
RegUnLoadKeyW
RegSetKeySecurity
RegGetKeySecurity
RegQueryValueExW
OpenServiceW
OpenSCManagerW
shell32
SHGetFileInfoW
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
ole32
CoInitialize
CoTaskMemFree
oleaut32
SysFreeString
VariantChangeType
SysAllocStringLen
VariantClear
SafeArrayGetLBound
SafeArrayCreate
Sections
.text Size: 676KB - Virtual size: 675KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.WPa Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ