C:\BuildAgent\work\91f32ca50b751f90\projects\setupexe\Searchband\setupexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_7fb24b78b6d350c01cbca3fef9c9405e_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-07_7fb24b78b6d350c01cbca3fef9c9405e_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_7fb24b78b6d350c01cbca3fef9c9405e_bkransomware
-
Size
9.1MB
-
MD5
7fb24b78b6d350c01cbca3fef9c9405e
-
SHA1
88e4b38194a924da6cd9b426863939816a601b16
-
SHA256
e0d6001a34eb65ddf7a5c897720449e7a1d5d71a125f0fef1fe4c244c31cd4db
-
SHA512
7b19aeb42f675dda9bff844e15faa3ade1f378451b4673e942385bbc6786a3370d36a7a690ef27cd5d251fbe159203ff9bf886552800cfe49a45b4825531713e
-
SSDEEP
196608:yLj9YvSPbiiJrG2Zp9qujO1n1m4jReqiWRd72k05s5gPHs:uj9Yv8iyrGYjjO1n1m41PiW/2ku/s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_7fb24b78b6d350c01cbca3fef9c9405e_bkransomware
Files
-
2024-09-07_7fb24b78b6d350c01cbca3fef9c9405e_bkransomware.exe windows:5 windows x86 arch:x86
c803b0c824fde423887f8b9c7eb5eecb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord175
ord169
ord70
ord190
ord141
ord88
comctl32
ord17
psapi
GetModuleFileNameExW
secur32
LsaEnumerateLogonSessions
LsaGetLogonSessionData
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateProcessesW
WTSFreeMemory
kernel32
GetOEMCP
GetACP
FreeLibrary
HeapAlloc
GetCurrentProcess
HeapFree
WaitForSingleObject
OutputDebugStringW
GetProcessHeap
OpenProcess
GetTempPathW
GetLastError
GetProcAddress
LoadLibraryA
DuplicateHandle
CloseHandle
GetVersion
LocalFree
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateFileW
CreateFileMappingW
LoadLibraryW
GetVersionExW
GetModuleFileNameW
MultiByteToWideChar
OpenMutexW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetCurrentProcessId
GetCommandLineW
FormatMessageW
CompareStringW
GetUserDefaultUILanguage
DeleteFileW
lstrlenW
WideCharToMultiByte
LCMapStringW
GetTempFileNameW
CreateDirectoryW
GetStdHandle
MoveFileExW
LoadResource
SizeofResource
WriteFile
LoadLibraryExW
FindResourceExA
Sleep
ReadFile
SetFilePointerEx
ExpandEnvironmentStringsW
HeapReAlloc
HeapSize
GetModuleFileNameA
ProcessIdToSessionId
IsValidCodePage
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LockResource
GetCurrentThreadId
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
ReadConsoleW
FlushFileBuffers
GetFileAttributesW
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStringTypeW
GetCommandLineA
RaiseException
RtlUnwind
GetCPInfo
user32
DialogBoxParamW
GetDlgItem
EndDialog
IsDlgButtonChecked
MessageBoxW
SetDlgItemTextW
EnableWindow
LoadStringW
MessageBoxExW
SetDlgItemTextA
SetWindowTextW
advapi32
RegCloseKey
ConvertSidToStringSidW
AdjustTokenPrivileges
GetLengthSid
RegOpenKeyExW
DuplicateTokenEx
LookupPrivilegeValueW
LookupAccountNameW
ConvertStringSidToSidW
RegQueryValueExW
EqualSid
CopySid
GetTokenInformation
OpenProcessToken
LsaNtStatusToWinError
shell32
CommandLineToArgvW
SHGetFolderPathW
ole32
StringFromGUID2
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.8MB - Virtual size: 8.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ