Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_ed6303db0484788a0ed2ce77cfd5afa5_bkransomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-01_ed6303db0484788a0ed2ce77cfd5afa5_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-01_ed6303db0484788a0ed2ce77cfd5afa5_bkransomware
-
Size
573KB
-
MD5
ed6303db0484788a0ed2ce77cfd5afa5
-
SHA1
b67eef2778fceaa190477e88e0ca7f863a1e857c
-
SHA256
e3b4e62713f9a13448f8a4d46e750dac3fd98ebba0ab2a932e3cd5f119c2b68f
-
SHA512
069bcb810317f72799e826d277c69cd75905331790a24820174fc760993ace6c142bb30397a847a29d34791bbed809d80e186803df47a36aff62e3583e351139
-
SSDEEP
12288:MHAQKJCR/RVnX55e6xtFxgqaRmXdQ89EJ9A2Y3ce1B8l:6A9CR/fX55e6xtFXaRC9EJqr978l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-01_ed6303db0484788a0ed2ce77cfd5afa5_bkransomware
Files
-
2024-09-01_ed6303db0484788a0ed2ce77cfd5afa5_bkransomware.exe windows:5 windows x86 arch:x86
720db812f2f096e771b340b63d7261a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
UpdateColors
SetTextColor
GetPolyFillMode
GetRandomRgn
GetNearestColor
GetMetaRgn
SetTextAlign
SetTextJustification
GetTextCharsetInfo
SetPixel
GetCurrentObject
GetClipRgn
GetMapMode
GetStretchBltMode
GetFontLanguageInfo
user32
GetDlgItemInt
EndPaint
GetDialogBaseUnits
GetMenuItemID
GetDlgItem
MoveWindow
GetWindowDC
RemovePropA
GetPropA
SetDlgItemTextA
CallWindowProcA
PostMessageA
GetMenuCheckMarkDimensions
GetMenu
IsWindowUnicode
WindowFromDC
IsWindowEnabled
GetWindowContextHelpId
SendMessageA
GetQueueStatus
EnableWindow
SetWindowTextA
GetScrollPos
GetCursor
DrawTextA
SetFocus
ShowWindow
GetDC
CheckDlgButton
GetInputState
GetMenuItemCount
GetForegroundWindow
GetWindowLongA
LoadIconA
GetMenuContextHelpId
kernel32
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetFullPathNameW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
GetStringTypeW
GetExitCodeProcess
WaitForSingleObject
CreatePipe
GetFullPathNameA
DeleteFileW
ReadConsoleW
SetFilePointerEx
RaiseException
GetFileAttributesExW
GetConsoleMode
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
LocalFlags
GlobalHandle
GlobalAlloc
GetCurrentProcess
GetTickCount
IsDebuggerPresent
LockResource
GlobalSize
GetLastError
GetProcessHeap
GetVersion
DeleteFileA
FlushFileBuffers
GetDriveTypeA
FindClose
GlobalFlags
GetCurrentProcessId
MoveFileA
WriteFile
SetFilePointer
CloseHandle
SizeofResource
GetFileType
IsProcessorFeaturePresent
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimeAsFileTime
HeapReAlloc
GetTempPathW
ReadFile
GetLocalTime
DuplicateHandle
CreateProcessW
CreateProcessA
DeleteCriticalSection
GetTimeZoneInformation
Beep
Sleep
GetCommandLineA
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetCurrentThread
GetConsoleCP
SetEndOfFile
Sections
.text Size: 521KB - Virtual size: 520KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE