Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_eb5838582b1d10fdc389f0e5ea66839e_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-29_eb5838582b1d10fdc389f0e5ea66839e_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_eb5838582b1d10fdc389f0e5ea66839e_bkransomware
-
Size
628KB
-
MD5
eb5838582b1d10fdc389f0e5ea66839e
-
SHA1
f7a9d654cdceab5302295913e9a788cde53d37d3
-
SHA256
366e80a46c32cc44fec5eee34139b6dae4f1a66e171323ee8602bad37f4bcfae
-
SHA512
05035c13d8e61cdc20c7a974bfbc72361e6d22db783a08b031fa675ff5672c7d5d4f9084eee0f6377d49d1d75f4c5318bc4b9e7c1e4e4a0465ada00e0a8dad0c
-
SSDEEP
12288:FcHq1i98SH61iIhf8eoWXjBRBq8BZhrnkNUN3yF09D:FcHii98RJ8OXjBRBLtrnkNUq09D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-29_eb5838582b1d10fdc389f0e5ea66839e_bkransomware
Files
-
2024-08-29_eb5838582b1d10fdc389f0e5ea66839e_bkransomware.exe windows:5 windows x86 arch:x86
f54e3d53ce4da471df87fa754278c6e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetModuleFileNameA
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
GetSystemDirectoryW
TerminateProcess
GetSystemDirectoryA
GetProcAddress
FindClose
Process32FirstW
CreateFileMappingW
Process32NextW
FindNextFileW
CreateToolhelp32Snapshot
SetFileAttributesW
CreateMutexW
GetComputerNameW
GetModuleFileNameW
SetCurrentDirectoryW
LoadLibraryW
GetTempPathW
MoveFileW
DeleteFileW
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CreateFileW
GetCurrentDirectoryW
GetFileType
LocalFree
lstrlenA
FlushFileBuffers
GetVersionExW
SetStdHandle
LoadLibraryExW
LCMapStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
RtlUnwind
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
CreateThread
DeleteFileA
GetTempPathA
CloseHandle
WaitForMultipleObjects
CreateDirectoryA
CreateProcessA
Sleep
InitializeCriticalSection
WriteFile
GetTickCount
WaitForSingleObject
InterlockedDecrement
SetEndOfFile
SetFilePointer
CreateFileA
DeleteCriticalSection
DecodePointer
EnterCriticalSection
HeapSize
GetLastError
HeapReAlloc
InterlockedExchange
RaiseException
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapFree
GetStdHandle
AreFileApisANSI
GetModuleHandleExW
GetCurrentThreadId
SetLastError
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCommandLineW
IsProcessorFeaturePresent
ResumeThread
ExitThread
EncodePointer
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
OutputDebugStringW
IsDebuggerPresent
HeapAlloc
WriteConsoleW
user32
CreateWindowExW
ShowWindow
GetCursorPos
SetWindowPos
BeginPaint
SetRectEmpty
CharNextA
LoadCursorW
GetSystemMetrics
DrawTextA
FillRect
GetDesktopWindow
ReleaseDC
TrackPopupMenu
PostQuitMessage
GetMessageW
SetCursor
GetDC
EndPaint
LoadMenuW
LoadIconW
RegisterClassExW
TranslateMessage
SendMessageW
SetWindowTextA
DefWindowProcW
CopyRect
DispatchMessageW
MessageBoxW
PtInRect
SetRect
GetSubMenu
DestroyWindow
SetForegroundWindow
IsWindow
gdi32
CreateCompatibleBitmap
FrameRgn
GetTextExtentPoint32A
EnumFontsW
SetTextColor
StretchBlt
SetBkMode
CreateFontW
GetDIBColorTable
CreateRoundRectRgn
CreateSolidBrush
TextOutA
BitBlt
DeleteDC
CreateDIBSection
SetDIBColorTable
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectW
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ord165
SHGetPathFromIDListW
SHGetSpecialFolderPathA
Shell_NotifyIconW
ShellExecuteA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
SysAllocString
SysFreeString
GetErrorInfo
VariantClear
ws2_32
htons
inet_addr
send
gethostbyname
closesocket
socket
connect
sendto
recv
setsockopt
recvfrom
WSAStartup
inet_ntoa
shlwapi
PathFileExistsA
PathIsDirectoryW
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
StrStrIA
StrStrIW
gdiplus
GdipAlloc
GdipGetImageHeight
GdipGetImagePalette
GdipCreateBitmapFromStream
GdiplusShutdown
GdipFree
GdiplusStartup
GdipGetImageWidth
GdipCloneImage
GdipBitmapLockBits
GdipGetImagePaletteSize
GdipDisposeImage
GdipGetImagePixelFormat
GdipDrawImageI
GdipBitmapUnlockBits
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipCreateBitmapFromScan0
msimg32
AlphaBlend
TransparentBlt
iphlpapi
GetAdaptersInfo
setupapi
SetupIterateCabinetW
urlmon
URLDownloadToFileW
Sections
.text Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 328KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ