Static task
static1
Behavioral task
behavioral1
Sample
2024-09-11_13814cd366a6ff81f11b235582a8c8cd_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-11_13814cd366a6ff81f11b235582a8c8cd_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-11_13814cd366a6ff81f11b235582a8c8cd_bkransomware
-
Size
6.7MB
-
MD5
13814cd366a6ff81f11b235582a8c8cd
-
SHA1
86f1995198273d7b09bbbc56ec764cdfc0438b82
-
SHA256
e96736d18db65792a0198a38f5991f9fec1dd5504c8378eecd7221f9b6b8f292
-
SHA512
375d67a5382878b22063f246ff918ecbb127a2de02d0b2949b3db3dca296cc7ccf31a8a70e700180006258c8a0444e1bd01990d01d70c8fdfdb803141eadf550
-
SSDEEP
196608:p+VLSKkgVpCoZ7pGMNVauJ1oaStR/AAz/:5KkgVLZ7pJNAbtZXb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-11_13814cd366a6ff81f11b235582a8c8cd_bkransomware
Files
-
2024-09-11_13814cd366a6ff81f11b235582a8c8cd_bkransomware.exe windows:6 windows x86 arch:x86
7677093839bbebc79acdfaa93c43bc3b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
WriteFile
GetStdHandle
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
InterlockedPushEntrySList
SignalObjectAndWait
SetEvent
CreateTimerQueue
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TerminateProcess
CreateEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetConsoleMode
SetFilePointerEx
ExitProcess
LoadLibraryW
SetStdHandle
CreateThread
EnumSystemLocalesW
GetSystemTime
GetCurrentProcessId
CloseHandle
TlsAlloc
GetStringTypeW
FindNextFileW
GetModuleHandleA
GetOEMCP
GetModuleFileNameA
GetFileType
LoadLibraryA
GlobalFree
EnterCriticalSection
IsValidCodePage
IsDBCSLeadByteEx
CompareStringW
CreateFileW
GetModuleFileNameW
MulDiv
Beep
GetSystemTimeAdjustment
CreateEventA
Sleep
WideCharToMultiByte
GetConsoleCP
GetCommandLineA
ExpandEnvironmentStringsA
WaitForSingleObjectEx
SetCommBreak
WaitForSingleObject
GetModuleHandleExW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCommState
LoadLibraryExW
FreeLibrary
SetEndOfFile
VirtualQuery
GetCPInfo
CreateFileA
GetDateFormatW
GetEnvironmentVariableW
FindFirstFileA
RaiseException
FlushFileBuffers
GetACP
GetTimeZoneInformation
CreateProcessA
InitializeCriticalSectionAndSpinCount
OpenProcess
GetProcessTimes
SetCommTimeouts
ClearCommBreak
GetWindowsDirectoryA
GetCurrentThread
GlobalLock
HeapFree
SetEnvironmentVariableW
InitializeSListHead
GetCurrentProcess
WaitNamedPipeA
TlsGetValue
SwitchToThread
WriteConsoleW
user32
SetWindowRgn
DestroyAcceleratorTable
EndPaint
IsRectEmpty
RegisterClassA
HideCaret
GetMessageW
PostQuitMessage
KillTimer
SetParent
GetClientRect
BeginPaint
CreateIconIndirect
WaitMessage
GetQueueStatus
ShowCursor
InflateRect
GetWindowPlacement
GetKeyboardLayout
SetRect
MessageBoxA
UnionRect
SystemParametersInfoW
SetScrollPos
ReleaseDC
EnableMenuItem
EndDialog
SetWindowsHookExA
ShowWindow
SetMenu
DrawMenuBar
CreateWindowExW
CheckRadioButton
RegisterClassW
SetCaretPos
ValidateRgn
SendMessageW
UpdateWindow
EnableWindow
EndMenu
DestroyMenu
DialogBoxParamA
GetCaretBlinkTime
SetDlgItemTextA
CheckMenuItem
CopyRect
GetWindowThreadProcessId
ShowOwnedPopups
ClientToScreen
SetCursor
GetSystemMenu
GetWindowRect
CreateDialogParamA
SendDlgItemMessageA
IsIconic
SetKeyboardState
SetCapture
LoadStringA
DeleteMenu
GetWindowInfo
GetWindowTextLengthA
EnumWindows
GetDC
GetCapture
CheckMenuRadioItem
GetScrollInfo
UnregisterClassA
GetDlgItem
DefWindowProcA
GetDesktopWindow
IsDlgButtonChecked
CreateCaret
IsWindow
MessageBoxW
ScrollWindowEx
GetSystemMetrics
GetDlgItemTextA
DrawFrameControl
SetScrollInfo
TranslateMDISysAccel
GetMessageTime
gdi32
SetLayout
TranslateCharsetInfo
PatBlt
GetTextExtentPoint32A
SetViewportOrgEx
SetWindowExtEx
SetTextColor
MaskBlt
GetCharacterPlacementW
Polygon
CreateFontA
StretchBlt
CreateFontIndirectA
GetDIBits
SetBkColor
SetDIBColorTable
GetRgnBox
CreatePalette
CreateBitmap
DeleteObject
SelectObject
GetPaletteEntries
SelectClipRgn
CreateCompatibleDC
PolyPolyline
PlayEnhMetaFile
CombineRgn
SetMapMode
OffsetRgn
PolyPolygon
SetPolyFillMode
GetObjectType
SelectPalette
SetPaletteEntries
GetObjectW
GetCharWidth32A
GetTextExtentPointA
GetCharABCWidthsFloatA
CreatePatternBrush
GetClipBox
SetROP2
SetTextAlign
IntersectClipRect
CreateDIBitmap
GetStockObject
ExtTextOutA
CloseEnhMetaFile
CreateEnhMetaFileW
UpdateColors
CreateSolidBrush
MoveToEx
LineTo
GetMetaFileBitsEx
SetPixel
GetRegionData
PtInRegion
CreatePenIndirect
SaveDC
GetDIBColorTable
CreateRectRgn
Polyline
SetViewportExtEx
RectVisible
RoundRect
TextOutA
ExtCreatePen
GetBitmapBits
ExtCreateRegion
GetCurrentPositionEx
advapi32
RegOpenKeyExA
LookupPrivilegeValueW
InitializeSecurityDescriptor
CopySid
AdjustTokenPrivileges
EqualSid
RegCloseKey
GetUserNameA
RegDeleteValueA
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 703KB - Virtual size: 703KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uUU Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ