Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_239bb13f733dbcfeeeade84650898342_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_239bb13f733dbcfeeeade84650898342_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_239bb13f733dbcfeeeade84650898342_bkransomware
-
Size
505KB
-
MD5
239bb13f733dbcfeeeade84650898342
-
SHA1
303b7ed5557cce4a8c911505d7e78e9722427361
-
SHA256
0d523ce239cd0906cb50eceef4ca08524c243cea059c1e02596b067fa2409f95
-
SHA512
2dd0fc9d51f577604a0d28434f4fbb4dc35fdcfbf9c4aeccd23001af2957485d24be8881d028c5840422e8d1fbb83f3d85f48c215e3eb9f75b9132ce8e1a2b4e
-
SSDEEP
12288:PHMnmRLEr5RRGD3/8634nUNpCqw0A7xm8g:PHMmRLEr53GT/8C4UNpCqgdm8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-05_239bb13f733dbcfeeeade84650898342_bkransomware
Files
-
2024-09-05_239bb13f733dbcfeeeade84650898342_bkransomware.exe windows:5 windows x86 arch:x86
79ff15f8d8ae58e1d79ab95b6576932d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
GetPixelFormat
GetMetaRgn
GetDCBrushColor
GetTextCharset
GetCurrentObject
GetNearestPaletteIndex
GetClipRgn
SetTextAlign
GetTextCharsetInfo
GetNearestColor
UpdateColors
GetMapMode
GetGraphicsMode
GetSystemPaletteUse
GetDCPenColor
GetTextColor
SetTextColor
GetStretchBltMode
SetTextJustification
GetFontUnicodeRanges
GetObjectType
GetFontLanguageInfo
GetPolyFillMode
SetSystemPaletteUse
user32
GetMenu
GetWindowDC
PostMessageA
MoveWindow
LoadIconA
CallWindowProcA
WindowFromDC
GetMenuItemCount
GetMenuItemID
SetWindowTextA
EnableWindow
GetMenuState
SetDlgItemTextA
SetFocus
GetWindowContextHelpId
ShowWindow
IsWindowEnabled
EndDialog
GetMenuCheckMarkDimensions
SendMessageA
EndPaint
GetQueueStatus
IsWindowUnicode
GetDlgItem
RemovePropA
GetScrollPos
GetDlgItemInt
GetPropA
DrawTextA
GetForegroundWindow
GetMenuContextHelpId
CheckDlgButton
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
FlushFileBuffers
FileTimeToSystemTime
GetProcAddress
GetModuleHandleA
WriteFile
GlobalAlloc
SetFilePointer
GetTickCount
IsDebuggerPresent
GetLastError
GetProcessHeap
GetCurrentProcess
DeleteFileA
LocalFlags
GlobalFlags
MoveFileA
GetCurrentThreadId
IsProcessorFeaturePresent
GlobalSize
LockResource
GetCurrentProcessId
SizeofResource
GetDriveTypeA
GlobalHandle
GetVersion
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
GetStdHandle
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
SetEnvironmentVariableA
Sections
.text Size: 454KB - Virtual size: 453KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE