Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_5a35bd24a384a8c284ae4b0b84ed8287_bkransomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-02_5a35bd24a384a8c284ae4b0b84ed8287_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_5a35bd24a384a8c284ae4b0b84ed8287_bkransomware
-
Size
372KB
-
MD5
5a35bd24a384a8c284ae4b0b84ed8287
-
SHA1
f6196cf11b0732d9063fc02d8474a4bc315160cc
-
SHA256
19aedaf4c8b83fbb4738dc552f0e5e0c17452624eb26b08f8d4cc7c63001f50e
-
SHA512
20ada95938a1ac632866f9e96dd19509843008315e7ecdca06a9c13122f8e4b027664c6bae2f3e363979c8432d2d604fff73a9b5534578f6bb738b24e05e5f43
-
SSDEEP
6144:6eCNN0LWKXm5Dqpbi9Xn8k1+YUK0xTgX+cLA2WUTK:+0yem5DWeXn8k17V0GOPWu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-02_5a35bd24a384a8c284ae4b0b84ed8287_bkransomware
Files
-
2024-09-02_5a35bd24a384a8c284ae4b0b84ed8287_bkransomware.exe windows:5 windows x86 arch:x86
be83b13aaba194cf0354a9192f9994cf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBkColor
GetDCPenColor
GetClipRgn
GetMapMode
GetNearestColor
GetNearestPaletteIndex
GetObjectType
GetPixelFormat
GetPolyFillMode
GetRandomRgn
GetSystemPaletteUse
GetTextCharacterExtra
GetTextAlign
GetTextColor
GetTextCharset
GetTextCharsetInfo
GetFontLanguageInfo
GetFontUnicodeRanges
SetPixel
SetSystemPaletteUse
SetTextCharacterExtra
SetTextColor
SetTextAlign
SetTextJustification
UpdateColors
user32
LoadIconA
GetWindowLongA
GetMenuContextHelpId
GetWindowContextHelpId
RemovePropA
GetPropA
GetScrollPos
GetWindowDC
WindowFromDC
GetForegroundWindow
DrawTextA
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMenuItemID
GetMenuState
GetMenu
IsWindowEnabled
EnableWindow
IsWindowUnicode
GetQueueStatus
GetInputState
GetKeyboardType
SetFocus
CheckDlgButton
SetDlgItemTextA
GetDlgItemInt
GetDlgItem
EndDialog
ShowWindow
CallWindowProcA
SendMessageA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
GetFileType
FileTimeToSystemTime
GetStdHandle
DeleteFileA
GetDriveTypeA
GetFileTime
SetFilePointer
WriteFile
IsDebuggerPresent
CloseHandle
GetLastError
QueryPerformanceCounter
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
IsProcessorFeaturePresent
GetVersion
GetTickCount
GetModuleHandleA
GetProcAddress
LoadResource
LockResource
GlobalAlloc
GlobalSize
GlobalFlags
GlobalHandle
LocalFlags
FindResourceA
MoveFileA
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetModuleFileNameW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
RtlUnwind
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
SetEnvironmentVariableA
Sections
.text Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ