Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware
-
Size
6.7MB
-
MD5
523c9df50948340df2e82213b22c72b7
-
SHA1
9260e4afb910e4f0c98aad1bf8b9bc31f5d7467f
-
SHA256
26f9eafb7869a2bfa9af2ede0363c2a41af6839c4263f6c107ab723de9dd2e37
-
SHA512
28432c1fe74d0f74f3b2edce9cdb2a987e170cd19738384ca63be432108d17d636fc78fc4d55a84b36f7c19ea1999988cd488798064daef986784d6eb4e92c32
-
SSDEEP
196608:8BHQB/DJvDD2YxyHx96sbsWX/sD0WlHfvpeRYXqZk+:uHYvZx2dbP0AWlJQYXqZk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware
Files
-
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe windows:6 windows x86 arch:x86
4a23fdeb229dc85f022af9f43e30c2e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
FreeLibrary
OutputDebugStringW
FreeEnvironmentStringsW
QueryPerformanceCounter
WriteFile
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
InterlockedPopEntrySList
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
DeleteCriticalSection
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
DuplicateHandle
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
FlushFileBuffers
GetConsoleMode
SetFilePointerEx
GlobalMemoryStatus
LoadLibraryW
SetStdHandle
WriteConsoleW
ExpandEnvironmentStringsW
DeleteFileA
GetSystemTime
OpenFileMappingA
GetCurrentProcessId
GetStringTypeW
FindNextFileW
GetModuleHandleA
FindNextFileA
GetModuleFileNameA
CreatePipe
GlobalFree
EnterCriticalSection
SetLastError
RaiseException
GetACP
CompareStringW
GetOverlappedResult
GetTimeZoneInformation
CreateProcessA
MulDiv
IsProcessorFeaturePresent
LeaveCriticalSection
GetSystemTimeAdjustment
Sleep
GetConsoleCP
OpenProcess
GetProcessTimes
GetSystemTimeAsFileTime
WaitForSingleObjectEx
ConnectNamedPipe
WaitForSingleObject
GetEnvironmentStringsW
SetEnvironmentVariableW
GetCurrentProcess
WaitNamedPipeA
LoadLibraryExW
UnmapViewOfFile
GetLocaleInfoA
GetEnvironmentVariableW
GetCommandLineW
ExitProcess
GlobalLock
CreateFileA
TlsFree
LocalFree
GetThreadTimes
CloseHandle
GetLocalTime
ResetEvent
IsValidCodePage
FindFirstFileA
GlobalUnlock
GetStartupInfoW
MultiByteToWideChar
GetModuleFileNameW
CreateEventA
WideCharToMultiByte
SetCommTimeouts
GetWindowsDirectoryA
HeapFree
InitializeSListHead
SetEndOfFile
VirtualQuery
GetLogicalProcessorInformation
CreateFileW
user32
SetWindowRgn
SetCursor
MapDialogRect
GetMessageW
PostQuitMessage
EndPaint
GetSystemMenu
GetMessageA
SetCapture
MsgWaitForMultipleObjects
LoadStringA
GetParent
LoadIconA
RemovePropA
GetClientRect
GetWindowTextLengthA
ShowCaret
SetScrollRange
GetDoubleClickTime
WaitMessage
GetQueueStatus
DrawFocusRect
ShowCursor
GetKeyboardState
CreateDialogIndirectParamA
OffsetRect
SetRect
CheckMenuRadioItem
SetWindowLongA
GetScrollInfo
MessageBoxA
UnionRect
UnregisterClassA
GetWindowLongA
SetClassLongA
GetDlgItem
DefWindowProcA
SetWindowsHookExA
RedrawWindow
CheckDlgButton
ShowWindow
DrawMenuBar
IsWindow
PostMessageA
RemoveMenu
CreateWindowExW
CheckRadioButton
SystemParametersInfoA
ScrollWindowEx
RegisterClassW
SetCaretPos
SetWindowTextA
SendMessageW
UpdateWindow
EnableWindow
EndMenu
DestroyMenu
GetDlgItemTextA
DialogBoxParamA
GetCaretBlinkTime
ToUnicode
SetDlgItemTextA
SetScrollInfo
CheckMenuItem
TranslateMDISysAccel
IsIconic
DestroyWindow
SetTimer
SendDlgItemMessageA
TrackPopupMenu
DeleteMenu
GetWindowInfo
CreateMenu
GetDC
GetWindowTextA
SystemParametersInfoW
ReleaseDC
EnableMenuItem
ScrollWindow
GetDesktopWindow
EnableScrollBar
AppendMenuA
CreateCaret
FlashWindow
InsertMenuA
LoadCursorA
DrawFrameControl
ValidateRect
CopyRect
GetMessageTime
RegisterClassA
IsRectEmpty
gdi32
GetCharacterPlacementW
CreateHatchBrush
DeleteDC
CreateFontA
CreateFontIndirectA
CopyEnhMetaFileA
GetRgnBox
GetEnhMetaFileHeader
CreateBitmap
GetRegionData
GetPaletteEntries
SelectClipRgn
CreatePenIndirect
CreateCompatibleDC
PolyPolyline
RectInRegion
SetMapMode
CreateCompatibleBitmap
Rectangle
Ellipse
ExtCreateRegion
SaveDC
GetObjectType
GetTextExtentPointW
CreateBitmapIndirect
GetCurrentPositionEx
SelectPalette
GetObjectW
GetCharABCWidthsW
CreateRectRgn
GetCharWidth32A
SetWindowExtEx
CreatePatternBrush
CreatePen
GetClipBox
RoundRect
IntersectClipRect
GetPixel
SetWinMetaFileBits
TextOutA
SetTextColor
TranslateCharsetInfo
GetWindowOrgEx
SetViewportOrgEx
LineTo
GetDeviceCaps
StretchBlt
GetDIBits
SetDIBColorTable
ExcludeClipRect
CreateHalftonePalette
SetPixel
SelectObject
PtInRegion
RealizePalette
SetPolyFillMode
SetPaletteEntries
GetDIBColorTable
SetROP2
RectVisible
CreateDIBitmap
EndDoc
GetStockObject
UpdateColors
GetTextExtentPoint32A
EndPage
PolyPolygon
SetWindowOrgEx
MoveToEx
CreatePolygonRgn
ExtCreatePen
GetTextExtentPointA
GetSystemPaletteEntries
advapi32
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegCloseKey
AdjustTokenPrivileges
GetLengthSid
LookupPrivilegeValueW
InitializeSecurityDescriptor
RegQueryValueExW
CopySid
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 681KB - Virtual size: 680KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hJL Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ