Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_131636624fda974e6d747a69fcd315de_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-02_131636624fda974e6d747a69fcd315de_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_131636624fda974e6d747a69fcd315de_bkransomware
-
Size
6.6MB
-
MD5
131636624fda974e6d747a69fcd315de
-
SHA1
d6f7ceddee47d11180851bc4b0fae254d81e559a
-
SHA256
7f9a9e5987d9c4ee0aeca6edd10ba117e8fb4c00e8ec0da1bd4a6cd57e335664
-
SHA512
e341ba7557762c4c5485ddd8c1ed4fc4be8a1ba19775b4658087f2e6f5dcf83b7f80dead462fcabd779ca7641c6cf12531defbfec0cdd9714b4ae1ccac7469cf
-
SSDEEP
98304:OG3Y27p44f2s8GVW2hb1lUXEGIBB9E1ZVa3bTDHnw0dUOya1dMb09gD/H7kgWW3C:OG3D872FUXE5BB4YnZd97MTDAgW02I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-02_131636624fda974e6d747a69fcd315de_bkransomware
Files
-
2024-09-02_131636624fda974e6d747a69fcd315de_bkransomware.exe windows:6 windows x86 arch:x86
5305aa5d4a5ec2cb73ba0423767f311f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetConsoleMode
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetThreadPriority
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
SetFilePointerEx
SetStdHandle
WriteConsoleW
ResumeThread
DeleteFileW
GetWindowsDirectoryW
EnumResourceTypesW
VirtualAlloc
GetLastError
GetCPInfoExW
ExitThread
SizeofResource
Sleep
LoadLibraryW
GetUserDefaultLangID
GetUserDefaultLCID
CompareFileTime
VerSetConditionMask
SetErrorMode
GetFullPathNameW
GetFileSize
GetThreadLocale
SwitchToThread
GetVersion
GetUserDefaultUILanguage
GetThreadPriority
LockResource
GetDiskFreeSpaceW
VerifyVersionInfoW
GetFileAttributesW
FormatMessageW
VirtualQueryEx
SignalObjectAndWait
CreateDirectoryW
SystemTimeToFileTime
FindResourceW
GetDriveTypeW
GetTempFileNameW
EncodePointer
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
CreateFileW
user32
ToAsciiEx
SetCursor
GetDlgItemInt
CharUpperBuffW
GetMessageW
AttachThreadInput
LoadIconA
MessageBeep
SetParent
CreateMenu
DrawTextExW
GetWindowTextLengthA
GetMenuItemInfoW
ModifyMenuW
GetDoubleClickTime
ShowCursor
GetScrollInfo
MessageBoxA
ReleaseDC
MonitorFromWindow
GetDlgItem
EndDialog
EnumChildWindows
ShowWindow
GetSysColorBrush
GetMenuItemCount
FlashWindow
CreateWindowExW
InsertMenuW
SendMessageW
UpdateWindow
EnableWindow
SetScrollRange
CheckMenuItem
GetWindow
RegisterWindowMessageW
IsIconic
SetKeyboardState
MsgWaitForMultipleObjects
DeleteMenu
GetParent
CharLowerBuffW
GetClientRect
SetFocus
ShowCaret
GetDC
GetQueueStatus
GetMenu
GetWindowPlacement
OffsetRect
GetWindowTextA
LoadMenuW
GetWindowLongW
SetScrollPos
PeekMessageA
EnableMenuItem
SetClassLongA
CharUpperW
SetWindowLongW
DefWindowProcA
GetDesktopWindow
CreatePopupMenu
RemoveMenu
SystemParametersInfoA
ScrollWindowEx
SetWindowTextA
GetDlgItemTextW
SetDlgItemTextW
MapWindowPoints
LoadCursorA
GetDlgCtrlID
GetCaretBlinkTime
SetScrollInfo
ValidateRect
RegisterClassA
DialogBoxParamA
gdi32
GetBitmapBits
MoveToEx
SetTextColor
CreateFontIndirectW
CreateFontIndirectA
GetDIBits
CreatePenIndirect
SetMapMode
SaveDC
GetTextExtentExPointA
GetCharABCWidthsFloatA
RectVisible
ExtCreatePen
BitBlt
MaskBlt
GdiFlush
CreateBitmap
DeleteObject
GetPaletteEntries
SelectClipRgn
PolyPolyline
CreateCompatibleBitmap
Rectangle
GetCharWidth32A
GetTextExtentPointA
IntersectClipRect
GetPixel
GetStockObject
CreateRectRgnIndirect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegLoadKeyW
ControlService
RegUnLoadKeyW
QueryServiceStatus
StartServiceW
EqualSid
CopySid
OpenServiceW
shell32
ShellExecuteExW
CommandLineToArgvW
SHGetFileInfoW
Shell_NotifyIconW
oleaut32
SafeArrayPtrOfIndex
SafeArrayGetLBound
SysFreeString
SysReAllocStringLen
Sections
.text Size: 652KB - Virtual size: 652KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IDfk Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ