Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_d01a6c88e171ee4c28124c04bae3935d_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_d01a6c88e171ee4c28124c04bae3935d_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_d01a6c88e171ee4c28124c04bae3935d_bkransomware
-
Size
6.7MB
-
MD5
d01a6c88e171ee4c28124c04bae3935d
-
SHA1
05be7b818cbdebe0280f7b642b9b15fe9c578e97
-
SHA256
1a00a4ea2ac90fcc71cfb8262b5f55873976032cd312e0eab00c4076b2c7224d
-
SHA512
8080d44f31619af3627e52abfac06d52acc6a7054bc2ea8e85abb7d65ec4a84bb193552582a141ea8d17df414917c71f907eb504c65c5cb2679b737c436a2a01
-
SSDEEP
98304:xRR5GN/JPfOGowV+GCz+n6ha97xlFYgwauMw7OU909NjydYUseFB+XptkrhyHE8o:R3GFVT2+cUFmak7O1N2dYU/F8HHE8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_d01a6c88e171ee4c28124c04bae3935d_bkransomware
Files
-
2024-09-07_d01a6c88e171ee4c28124c04bae3935d_bkransomware.exe windows:6 windows x86 arch:x86
1afecd7d98a9c4c6d236cf584176bb2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TerminateProcess
CreateEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
EnterCriticalSection
LCMapStringW
FlushFileBuffers
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
GetDateFormatW
CreateThread
DeleteFileA
EnumSystemLocalesW
OpenFileMappingA
CloseHandle
TlsAlloc
DeleteCriticalSection
GetStringTypeW
FindNextFileA
GetOEMCP
GetModuleFileNameA
LoadLibraryA
IsValidCodePage
CreateNamedPipeA
RaiseException
GlobalUnlock
GetACP
CreateFileW
GetTimeZoneInformation
MulDiv
IsProcessorFeaturePresent
LeaveCriticalSection
Sleep
GetLocaleInfoW
IsValidLocale
GetConsoleCP
GetProcessTimes
GetWindowsDirectoryA
QueryPerformanceCounter
SetEnvironmentVariableW
InitializeSListHead
GetCurrentProcess
GetCommState
SetDllDirectoryW
LoadLibraryExW
SetEndOfFile
GetCPInfo
CreateFileA
GetEnvironmentVariableW
GetCommandLineW
LocalFree
FindNextFileW
CreatePipe
IsDBCSLeadByteEx
FindFirstFileA
GetOverlappedResult
GetSystemDirectoryA
CreateProcessA
Beep
CreateEventA
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
OpenProcess
GetCommandLineA
ClearCommBreak
GetSystemTimeAsFileTime
GetTickCount
ConnectNamedPipe
SetCommBreak
GetEnvironmentStringsW
WaitNamedPipeA
VirtualQuery
GetProcessAffinityMask
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
WaitForSingleObject
GetCurrentThread
WriteConsoleW
user32
ToAsciiEx
ShowOwnedPopups
EndPaint
ClientToScreen
DestroyWindow
SetWindowRgn
GetSystemMenu
MapDialogRect
GetMessageW
MsgWaitForMultipleObjects
IsZoomed
LoadStringA
LoadIconA
GetClientRect
CreateMenu
SetFocus
GetWindowTextLengthA
ShowCaret
EnumWindows
SetScrollRange
GetDoubleClickTime
CreateIconIndirect
GetCapture
ShowCursor
CreateDialogIndirectParamA
GetWindowPlacement
GetWindowTextA
SetRect
CheckMenuRadioItem
MessageBoxA
GetWindowLongA
SetScrollPos
EnableMenuItem
SetClassLongA
DefWindowProcA
SetWindowsHookExA
GetSysColor
CheckDlgButton
CreateCaret
IsWindow
FlashWindow
CreateWindowExW
CheckRadioButton
SystemParametersInfoA
ScrollWindowEx
BeginDeferWindowPos
RegisterClassW
GetSystemMetrics
SetCaretPos
SetWindowTextA
SendMessageW
UpdateWindow
EnableWindow
DestroyMenu
DestroyIcon
TranslateMDISysAccel
GetWindowThreadProcessId
RegisterClassA
GetMessageA
DestroyAcceleratorTable
CreateDialogParamA
IsIconic
DrawIconEx
GetDC
GetKeyboardState
GetScrollInfo
UnionRect
InvalidateRect
ReleaseDC
DrawStateW
EndDialog
GetDesktopWindow
DrawMenuBar
AppendMenuA
MessageBoxW
LoadCursorA
ToUnicode
GetMessageTime
ShowWindow
gdi32
MoveToEx
SetWindowOrgEx
SetLayout
TranslateCharsetInfo
SetViewportOrgEx
SetTextColor
CreateHatchBrush
StretchBlt
GetDIBits
GetEnhMetaFileHeader
GetRegionData
SelectObject
GetPaletteEntries
CreateCompatibleDC
PlayEnhMetaFile
CreateCompatibleBitmap
CreateBrushIndirect
OffsetRgn
ExtCreateRegion
SaveDC
RealizePalette
GetTextExtentPointW
GetBkColor
SetPaletteEntries
GetCharABCWidthsW
SetStretchBltMode
GetNearestPaletteIndex
CreateRectRgn
GetCharWidth32A
GetSystemPaletteEntries
CreatePatternBrush
Polyline
CreatePen
SetViewportExtEx
RectVisible
CloseEnhMetaFile
CreateEnhMetaFileW
TextOutA
ExtCreatePen
PolyPolygon
BitBlt
SetWindowExtEx
MaskBlt
CreateFontA
CreateFontIndirectA
SetBkColor
CopyEnhMetaFileA
ExcludeClipRect
GdiFlush
CreateHalftonePalette
GetRgnBox
SetPixel
CreateBitmap
CreateRectRgnIndirect
RectInRegion
Rectangle
GetObjectW
GetTextExtentExPointA
GetTextExtentPointA
SetROP2
SetTextAlign
ExtTextOutA
PolyPolyline
advapi32
AdjustTokenPrivileges
GetLengthSid
SetSecurityDescriptorOwner
RegDeleteValueA
InitializeSecurityDescriptor
GetUserNameA
RegOpenKeyExA
LookupPrivilegeValueW
EqualSid
shell32
ShellExecuteExW
Sections
.text Size: 682KB - Virtual size: 681KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xPjf Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ