Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_421a989552c7dfc2f76c1d90bd2ea34f_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_421a989552c7dfc2f76c1d90bd2ea34f_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_421a989552c7dfc2f76c1d90bd2ea34f_bkransomware
-
Size
6.6MB
-
MD5
421a989552c7dfc2f76c1d90bd2ea34f
-
SHA1
9c26b5d7266c045bd26f7ceba0ef7f17063e0fab
-
SHA256
bff84d8174c703a693edef98b4876b749efc6704d5fd8f48d022826ea6ce7486
-
SHA512
3d5990d1a7c85b8934bf3c310975f189687515ed3b0028919050a42bc088d4ce5b88fe571c20c7f074d72934a067070c5979711ca468c09e27095f157a233c11
-
SSDEEP
196608:fms2fERGdEevJEP4DTcDwO090yowJxkqcFd:uZfDdXrcDw990ZsxkXF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_421a989552c7dfc2f76c1d90bd2ea34f_bkransomware
Files
-
2024-09-07_421a989552c7dfc2f76c1d90bd2ea34f_bkransomware.exe windows:6 windows x86 arch:x86
fd353b92daf2560d99c2895be487783b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
InterlockedPopEntrySList
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SwitchToThread
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
WinExec
IsDebuggerPresent
DeviceIoControl
RemoveDirectoryW
VirtualAlloc
VerifyVersionInfoW
GetPrivateProfileIntW
GetSystemDefaultUILanguage
GetTempPathW
SetThreadPriority
ExitThread
FileTimeToSystemTime
lstrcpynW
ReadProcessMemory
Sleep
VirtualQueryEx
GetPrivateProfileStringW
SignalObjectAndWait
GetUserDefaultLCID
CompareFileTime
VerSetConditionMask
EnumCalendarInfoW
FindResourceW
SetErrorMode
EnumResourceNamesW
GetTempFileNameW
EncodePointer
GetFullPathNameW
SuspendThread
DeleteFileW
LockResource
GetDiskFreeSpaceW
GetExitCodeProcess
GetVersionExW
FormatMessageW
SizeofResource
LoadLibraryW
GetSystemDirectoryW
GetUserDefaultLangID
SystemTimeToFileTime
SetThreadAffinityMask
RaiseException
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
CloseHandle
CreateFileW
user32
ShowWindow
ToAsciiEx
EndPaint
GetMessageA
HideCaret
CharUpperBuffW
CreateDialogParamA
GetMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
PostMessageW
KillTimer
LoadIconA
GetClientRect
CreateMenu
ModifyMenuW
ShowCaret
BeginPaint
GetDoubleClickTime
GetQueueStatus
SetDlgItemInt
GetMenu
GetWindowPlacement
OffsetRect
GetWindowTextA
SetPropA
SetRect
MessageBoxA
UnionRect
InvalidateRect
GetWindowLongA
GetWindowTextW
SetScrollPos
GetClassNameW
GetDlgItem
GetMessageTime
DestroyCaret
SendDlgItemMessageW
CheckDlgButton
EnumChildWindows
ScrollWindow
CreateCaret
IsWindow
PostMessageA
RemoveMenu
GetKeyboardType
CreateWindowExW
InsertMenuW
SetWindowTextA
GetDlgItemTextW
SendMessageW
UpdateWindow
EnableWindow
DialogBoxParamA
SetCursor
SetTimer
SendDlgItemMessageA
IsIconic
GetParent
RemovePropA
MessageBeep
GetMenuStringW
CharLowerBuffW
SetParent
SetFocus
SetScrollRange
GetDC
GetCapture
ShowCursor
UnregisterClassA
PeekMessageA
ReleaseDC
SetWindowLongW
RedrawWindow
GetDesktopWindow
SetMenu
GetMenuItemCount
SystemParametersInfoA
ScrollWindowEx
RegisterClassW
SetCaretPos
InsertMenuA
MapWindowPoints
GetDlgItemTextA
CheckMenuItem
TranslateMDISysAccel
gdi32
GetBitmapBits
MoveToEx
BitBlt
GetWindowOrgEx
PatBlt
LineTo
CreateFontIndirectW
CreateFontA
CreateFontIndirectA
GetDIBits
GdiFlush
CreateBitmap
SelectObject
Rectangle
SaveDC
GetCurrentPositionEx
GetDIBColorTable
GetTextExtentExPointA
CreateRectRgn
GetCharABCWidthsFloatA
GetPixel
GetStockObject
UpdateColors
CreateSolidBrush
ExtCreatePen
TranslateCharsetInfo
SetTextColor
GetCharacterPlacementW
GetDeviceCaps
SetDIBColorTable
ExcludeClipRect
CreateCompatibleDC
SetMapMode
GetObjectType
SelectPalette
RectVisible
RoundRect
IntersectClipRect
ExtTextOutA
RestoreDC
CreatePenIndirect
comdlg32
FindTextW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegLoadKeyW
GetUserNameA
StartServiceW
RegQueryInfoKeyW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegUnLoadKeyW
ControlService
GetLengthSid
AllocateAndInitializeSid
RegGetKeySecurity
InitializeSecurityDescriptor
EqualSid
shell32
ShellExecuteExW
Shell_NotifyIconW
CommandLineToArgvW
ShellExecuteW
ole32
CoInitialize
oleaut32
SysAllocStringLen
VariantInit
SafeArrayCreate
VariantClear
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
VariantChangeType
SysReAllocStringLen
Sections
.text Size: 627KB - Virtual size: 627KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bzim Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ