Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_f842b2739efbbebaa1a776b86e923bfa_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_f842b2739efbbebaa1a776b86e923bfa_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_f842b2739efbbebaa1a776b86e923bfa_bkransomware
-
Size
6.6MB
-
MD5
f842b2739efbbebaa1a776b86e923bfa
-
SHA1
0d5f3caf6b476c68ace66e784d7f4a72fb79568a
-
SHA256
1a4720670d2acb14288c0a7f08334f56086df6696cedcecf5cf8898536c4b550
-
SHA512
ada49e00a720287746529a54db9c1abd6bfc2e9c44c83873911762b5931068379e2c9ecdd0e3686d5ee04453ea4defc19b9ae1ef9d4fdb3ae0fca972588e5d06
-
SSDEEP
98304:A8YMFTtpjl2nI0/uIcqMvq60bLDfmR/XoNdvdRUsv3F383OtNYEMbJDTvCpAFYq:TrYIbZqMC7DJzdRUS1xMzI8Yq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_f842b2739efbbebaa1a776b86e923bfa_bkransomware
Files
-
2024-09-07_f842b2739efbbebaa1a776b86e923bfa_bkransomware.exe windows:6 windows x86 arch:x86
ea140940049b64ffb272ece1bdf843a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
InterlockedPopEntrySList
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
ResumeThread
GetUserDefaultUILanguage
QueryDosDeviceW
GetDiskFreeSpaceW
VirtualAlloc
GetLastError
EncodePointer
GetTempPathW
WritePrivateProfileStringW
SetThreadPriority
ExitThread
FileTimeToSystemTime
GetFileAttributesW
lstrcpynW
HeapCreate
SizeofResource
Sleep
LoadLibraryW
GetSystemDirectoryW
VirtualQueryEx
CreateDirectoryW
VerSetConditionMask
EnumCalendarInfoW
FindResourceW
GetSystemDefaultUILanguage
FindFirstFileW
GetFileSize
GetFullPathNameW
FormatMessageW
IsDebuggerPresent
GetThreadPriority
EnumResourceTypesW
DeviceIoControl
RemoveDirectoryW
LockResource
GetCPInfoExW
VerifyVersionInfoW
RtlCaptureContext
EnumResourceNamesW
UnregisterWait
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
DecodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
CreateFileW
user32
RegisterClassW
ToAsciiEx
SetCursor
SetTimer
CharUpperBuffW
MapDialogRect
GetMessageW
TrackPopupMenu
PostMessageW
KillTimer
MsgWaitForMultipleObjects
GetKeyState
GetSubMenu
MessageBeep
CreateMenu
DrawTextExW
SetFocus
GetMenuItemInfoW
GetKeyboardState
SetDlgItemInt
OffsetRect
SetPropA
SetRect
MessageBoxA
UnregisterClassA
GetWindowTextW
ReleaseDC
EnableMenuItem
GetDlgItem
ScrollWindow
EndDialog
DefWindowProcA
GetSysColor
CheckDlgButton
EnumChildWindows
ShowWindow
CreatePopupMenu
GetMonitorInfoW
GetMenuItemCount
CreateWindowExW
CheckRadioButton
InsertMenuW
GetSysColorBrush
GetSystemMetrics
SetWindowTextA
SendMessageW
UpdateWindow
GetCaretBlinkTime
SetDlgItemTextA
GetMessageTime
GetWindow
MapWindowPoints
GetMessageA
GetDlgItemInt
SetWindowRgn
GetSystemMenu
GetWindowRect
CreateDialogParamA
SendDlgItemMessageA
CharNextW
SetCapture
IsZoomed
GetParent
GetWindowTextLengthA
DrawEdge
WaitMessage
GetDC
GetQueueStatus
GetMenu
GetWindowTextA
GetKeyboardLayout
GetScrollInfo
LoadMenuW
SetScrollPos
DestroyCaret
SendDlgItemMessageW
GetDesktopWindow
SetMenu
PostMessageA
FlashWindow
GetKeyboardType
GetDlgItemTextW
GetDlgCtrlID
GetDlgItemTextA
DialogBoxParamA
SetWindowTextW
gdi32
GetBitmapBits
SetTextColor
CreateFontIndirectW
CreateFontIndirectA
SetDIBColorTable
SetPixel
DeleteObject
CreateCompatibleDC
PolyPolyline
CreateCompatibleBitmap
Rectangle
CreateBrushIndirect
SaveDC
RealizePalette
GetTextExtentExPointA
Polyline
SetTextAlign
IntersectClipRect
CreateDIBitmap
GetStockObject
UpdateColors
CreatePenIndirect
SetPaletteEntries
BitBlt
TranslateCharsetInfo
LineTo
DeleteDC
CreateFontA
CopyEnhMetaFileA
ExcludeClipRect
CreatePalette
CreateBitmap
GetObjectType
GetCurrentPositionEx
SelectPalette
GetDIBColorTable
GetCharWidth32A
GetTextExtentPointA
RectVisible
RoundRect
RestoreDC
CreateSolidBrush
GetSystemPaletteEntries
comdlg32
GetSaveFileNameW
FindTextW
advapi32
RegUnLoadKeyW
RegEnumKeyExW
ControlService
GetUserNameA
RegSetKeySecurity
StartServiceW
ChangeServiceConfigW
QueryServiceStatus
RegGetKeySecurity
InitializeSecurityDescriptor
RegQueryInfoKeyW
EqualSid
OpenServiceW
shell32
CommandLineToArgvW
ShellExecuteExW
ole32
CoInitialize
oleaut32
SafeArrayPtrOfIndex
VariantChangeType
SysAllocStringLen
SafeArrayCreate
VariantClear
SafeArrayGetLBound
VariantCopy
VariantInit
Sections
.text Size: 641KB - Virtual size: 641KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VHie Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ