Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_a29feeb3c872bda778ac7647132ec1df_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-09_a29feeb3c872bda778ac7647132ec1df_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_a29feeb3c872bda778ac7647132ec1df_bkransomware
-
Size
497KB
-
MD5
a29feeb3c872bda778ac7647132ec1df
-
SHA1
94b2886b6254bc7b3f8137f055f68a7084e9afa5
-
SHA256
851701824138ab84c9c02d21385db30273598676e92c505b6a0346b2426a2f7c
-
SHA512
616278b8d1715902626b474899e16f9143d8001d9972a20403fab4e2d292f267bb8298cbe936525bf2408c00ecf8035b6a8bc6ec585f1c42fea28c3d8ef7243b
-
SSDEEP
6144:CwSP6DlccB78Y1q35vdsaVNkWs5rXOUnECGcODNdDyToTrv39TS:CwSClcu7N1qJiaoX/ODNdDyQ3F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-09_a29feeb3c872bda778ac7647132ec1df_bkransomware
Files
-
2024-09-09_a29feeb3c872bda778ac7647132ec1df_bkransomware.exe windows:5 windows x86 arch:x86
7d3a052531c093f86bb637862b97c88a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetNearestPaletteIndex
GetFontUnicodeRanges
UpdateColors
GetFontLanguageInfo
GetDCBrushColor
SetSystemPaletteUse
GetDCPenColor
GetPolyFillMode
GetMapMode
SetTextCharacterExtra
GetRandomRgn
SetPixel
GetBkColor
GetStretchBltMode
user32
CheckDlgButton
GetMenuCheckMarkDimensions
DrawTextA
BeginPaint
GetCursor
EnableWindow
GetMenuItemCount
SendMessageA
MoveWindow
SetFocus
GetDlgItemInt
EndDialog
RemovePropA
ShowWindow
GetMenuState
GetPropA
CallWindowProcA
GetScrollPos
EndPaint
SetDlgItemTextA
GetForegroundWindow
GetDC
GetDlgItem
GetWindowLongA
GetInputState
LoadIconA
SetWindowTextA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetProcAddress
GetModuleHandleA
IsDebuggerPresent
GetCurrentProcess
DeleteFileA
LocalFlags
GetCurrentThreadId
GlobalFlags
GetStdHandle
SetFilePointer
GetFileTime
LoadResource
GetDriveTypeA
GetProcessHeap
IsProcessorFeaturePresent
GlobalAlloc
SizeofResource
GetVersion
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
SetEnvironmentVariableA
Sections
.text Size: 433KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE