lhxXfY9mIrDZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-31_3790ca5061d4f0cd48d960d9a34e4af4_bkransomware.exe
Resource
win7-20240704-en
General
-
Target
2024-08-31_3790ca5061d4f0cd48d960d9a34e4af4_bkransomware
-
Size
303KB
-
MD5
3790ca5061d4f0cd48d960d9a34e4af4
-
SHA1
f18281a0973246e7a26965678ad34b41206f08cf
-
SHA256
ec5876e9acd7913015a69fb5e32c8606c91179bcf3328c1fd06c63be1c17de61
-
SHA512
8e15947814152381df642fdcbf53de96aad6a844b46fc3d6119d3b4369f82facee9c9c7587d3f1a9384fb86af4af45f627b5f12f303f21b4dd6d21eec5af8db0
-
SSDEEP
3072:CWz1xCOGJJ8CFJKl797sp+TjB2vtxcUlV5SSZQZ/ZHYCvztQXo:Cc1xpGJJfFoddsVNS6QvHjzL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-31_3790ca5061d4f0cd48d960d9a34e4af4_bkransomware
Files
-
2024-08-31_3790ca5061d4f0cd48d960d9a34e4af4_bkransomware.exe windows:6 windows x86 arch:x86
81f57b81eb6db8b252da01e9143dfb75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
WriteConsoleW
OutputDebugStringW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
FreeLibrary
SetConsoleCtrlHandler
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
CreateSemaphoreW
GetModuleHandleW
GetTickCount
TlsFree
TlsSetValue
CloseHandle
LoadLibraryA
GetProcAddress
VirtualAlloc
HeapSize
GetLocalTime
HeapAlloc
RtlUnwind
GetCommandLineA
GetLastError
HeapFree
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
SetLastError
GetCurrentThread
GetCurrentThreadId
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
CreateFileW
user32
LoadIconA
LoadCursorA
MessageBoxA
EndPaint
BeginPaint
UpdateWindow
TranslateAcceleratorA
LoadAcceleratorsA
ShowWindow
RegisterClassExA
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
LoadBitmapA
GetDesktopWindow
SetWindowLongA
GetWindowLongA
GetCursorPos
GetWindowRect
ReleaseDC
GetDC
TrackPopupMenu
GetSubMenu
CheckMenuItem
LoadMenuA
KillTimer
SetTimer
SetWindowPos
DestroyWindow
CreateWindowExA
DefWindowProcA
gdi32
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
StretchBlt
Exports
Exports
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ