C:\Builds\13810\Tools\TestLimit_master\bin\Win32\Release\Testlimit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_7e6b6ac8acd83a5e272ffc97f4c8f654_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_7e6b6ac8acd83a5e272ffc97f4c8f654_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_7e6b6ac8acd83a5e272ffc97f4c8f654_bkransomware
-
Size
776KB
-
MD5
7e6b6ac8acd83a5e272ffc97f4c8f654
-
SHA1
f3f6ad97c23f1571b3c7045ea8e22e8cd55fd2ed
-
SHA256
bf7bbf38201ec699fcc252191528163dac3553cdfaa3c5d46ec66f27ff22ef54
-
SHA512
5ad351095fe3b6283c4de3d1b324e2a9e015c9060d5092b225141880b7c3639f6d0cc6f59a00cb1718ad1b95a87b97a52dbc7684adf55bd92d5e575476ee849c
-
SSDEEP
12288:48+v04s/SN71YoiqIpRNVJnLnFhRqppMjeBhvxGfOLxcBe:4Rv0//SNOoiqcRJ/RBoqfOL2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_7e6b6ac8acd83a5e272ffc97f4c8f654_bkransomware
Files
-
2024-09-07_7e6b6ac8acd83a5e272ffc97f4c8f654_bkransomware.exe windows:6 windows x86 arch:x86
5b0d2c8a351c6d461ad97a49997cf8ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualAlloc
GetLargePageMinimum
VirtualLock
AllocateUserPhysicalPages
GetModuleFileNameA
GetProcessWorkingSetSize
SetProcessWorkingSetSize
FormatMessageA
CreateFileMappingA
GetTickCount
SetStdHandle
WriteConsoleW
SetFilePointerEx
RtlUnwind
HeapReAlloc
HeapSize
OutputDebugStringW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetSystemInfo
CreateProcessA
CreateThread
GetCurrentProcessId
GetCurrentProcess
Sleep
GetLastError
CreateEventA
CloseHandle
DuplicateHandle
WriteFile
CreateFileA
LoadLibraryA
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
GetFileType
GetCommandLineW
ReadFile
GetStdHandle
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetModuleFileNameW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
GetProcessHeap
CreateFileW
FlushFileBuffers
GetConsoleCP
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
user32
CreateMenu
RegisterClassA
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
gdi32
EndPage
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
CreateBitmap
comdlg32
PrintDlgA
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueA
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE