Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_82108b0716c4d0e89ce1b5a369a764bf_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-09_82108b0716c4d0e89ce1b5a369a764bf_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_82108b0716c4d0e89ce1b5a369a764bf_bkransomware
-
Size
468KB
-
MD5
82108b0716c4d0e89ce1b5a369a764bf
-
SHA1
7df8f114349d97c6a0f2f4f0014ef6a94996b9e3
-
SHA256
dcadc70cd3c5fe7e1b4d1afb690cc78d5b7dd8506a050beacbf69a16903b63f3
-
SHA512
8259b2fb74434fa32708632cd293416840d8125c4ff47ddc7e87d1fcbd7240d384f741fa2a191e0fbcde7dd9c74c37e058d1b9af906b40a128e657405dcce327
-
SSDEEP
12288:j7aEYDcezGIEU2/rHdfFKZkYmPR/njqmKYk:j7goiCDda7Arq/Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-09_82108b0716c4d0e89ce1b5a369a764bf_bkransomware
Files
-
2024-09-09_82108b0716c4d0e89ce1b5a369a764bf_bkransomware.exe windows:5 windows x86 arch:x86
2bffce7a017c79ced1f7fc97442b3f81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCBrushColor
GetNearestColor
GetTextColor
GetBkColor
GetDCPenColor
GetClipRgn
GetMetaRgn
GetRandomRgn
UpdateColors
SetTextColor
GetStretchBltMode
user32
DrawTextA
CheckDlgButton
EnableWindow
SetDlgItemTextA
GetInputState
IsWindowUnicode
GetDialogBaseUnits
EndDialog
SetFocus
GetPropA
LoadIconA
GetQueueStatus
GetDlgItemInt
GetMenuContextHelpId
SendMessageA
GetDC
GetDlgItem
GetWindowLongA
IsWindowEnabled
GetWindowContextHelpId
ShowWindow
WindowFromDC
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
GetProcAddress
GetCurrentThreadId
CloseHandle
GetLastError
IsProcessorFeaturePresent
FindClose
GetFileTime
LoadResource
DeleteFileA
LockResource
GetModuleHandleA
GlobalAlloc
GlobalHandle
GetTickCount
GlobalFlags
GetCurrentProcessId
FlushFileBuffers
WriteFile
GlobalSize
SetFilePointer
SizeofResource
GetFileType
LocalFlags
GetCurrentProcess
QueryPerformanceCounter
GetVersion
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStdHandle
GetModuleFileNameW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
SetLastError
GetCurrentThread
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableA
Sections
.text Size: 399KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE