Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_d34db4a554b5edd8f644dd3de0c5fd9a_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_d34db4a554b5edd8f644dd3de0c5fd9a_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_d34db4a554b5edd8f644dd3de0c5fd9a_bkransomware
-
Size
580KB
-
MD5
d34db4a554b5edd8f644dd3de0c5fd9a
-
SHA1
76220c6b7afc1f5f59ff9c0fc8cee716d2f6d404
-
SHA256
897e07bb0c3509b55d78db81134c4233a0c2b6a5e666acda0a6a6420c72ab9ad
-
SHA512
e8f42f37da6d6998972442ed795ad2381d7f4aa77463a64408051fce1aa6cba4bc18b6fb6ab8c1ccf065d4cb26af2147ac97f7ccea467b37357e6f757826eb54
-
SSDEEP
12288:MLFGOAsuIEWiBpIIaiJ9cJrJNFcqwupZN4Txg:0lAbtWiBpIIaiJ9zgNj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-05_d34db4a554b5edd8f644dd3de0c5fd9a_bkransomware
Files
-
2024-09-05_d34db4a554b5edd8f644dd3de0c5fd9a_bkransomware.exe windows:5 windows x86 arch:x86
89b103af6db4d834adab2bf70c7752c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetFontLanguageInfo
SetTextCharacterExtra
GetMapMode
SetTextColor
GetNearestPaletteIndex
GetNearestColor
GetFontUnicodeRanges
SetTextAlign
GetDCPenColor
GetObjectType
SetSystemPaletteUse
GetGraphicsMode
SetTextJustification
GetCurrentObject
GetClipRgn
UpdateColors
SetPixel
GetPixelFormat
GetMetaRgn
GetDeviceCaps
GetRandomRgn
GetPolyFillMode
user32
RemovePropA
SetFocus
IsWindowUnicode
GetMenuContextHelpId
GetWindowDC
EndDialog
GetForegroundWindow
LoadIconA
GetQueueStatus
IsWindowEnabled
GetPropA
GetMenuState
WindowFromDC
GetMenuItemCount
CallWindowProcA
ShowWindow
MoveWindow
PostMessageA
GetDC
SendMessageA
GetWindowContextHelpId
GetDlgItem
CheckDlgButton
GetKeyboardType
SetWindowTextA
GetMenuItemID
GetDlgItemInt
SetDlgItemTextA
GetInputState
BeginPaint
DrawTextA
GetCursor
EnableWindow
GetMenu
GetScrollPos
kernel32
ReadConsoleW
ReadFile
FlushFileBuffers
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
RaiseException
GetFileAttributesExW
GetFileType
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
GetStringTypeW
GetConsoleMode
GetConsoleCP
GetCurrentThread
RtlUnwind
GetProcAddress
GetModuleHandleA
MoveFileA
GetCurrentProcessId
GetLastError
GetProcessHeap
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
FindResourceA
GetDriveTypeA
SetFilePointer
IsDebuggerPresent
LockResource
SizeofResource
DeleteFileA
LoadResource
WriteFile
IsProcessorFeaturePresent
GetCurrentProcess
GetVersion
GlobalSize
LocalFlags
GlobalAlloc
CloseHandle
GetFileTime
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
DeleteFileW
GetTimeZoneInformation
GetFullPathNameA
DeleteCriticalSection
Beep
Sleep
GetTempPathA
GetCommandLineA
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetEndOfFile
Sections
.text Size: 515KB - Virtual size: 514KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE