Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_6c35319ee3edcff0479cd6ff70169ee7_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-13_6c35319ee3edcff0479cd6ff70169ee7_bkransomware.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-09-13_6c35319ee3edcff0479cd6ff70169ee7_bkransomware
-
Size
6.6MB
-
MD5
6c35319ee3edcff0479cd6ff70169ee7
-
SHA1
1a90779e0580f4cfbaef47dbdcaca002d7f998e0
-
SHA256
892e23198c97eba041cfb3c675f216f2cded7c1b468bf5e2d24040af2471de89
-
SHA512
c1c2f1b8785b30eea2ff8d7fff5ddf2f3668275fe5f03e1bc309daa178c6f2422b4bf1bcb8edae03f110da0ad8eb8a9eb5d0c73eeddb19ba36b6766d6f833cb8
-
SSDEEP
196608:VqfcdOTp2xtLwT/8fEJxldT8VqWIWyvU:QpGHsJjd4V3IJ8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_6c35319ee3edcff0479cd6ff70169ee7_bkransomware
Files
-
2024-09-13_6c35319ee3edcff0479cd6ff70169ee7_bkransomware.exe windows:6 windows x86 arch:x86
a6ad471f8217fa837d47bff39e22b118
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
QueryPerformanceCounter
WriteFile
GetStdHandle
GetCPInfo
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
VirtualFree
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
TlsGetValue
TlsAlloc
CreateEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
LeaveCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
WaitForSingleObject
DuplicateHandle
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetConsoleCP
GetLocaleInfoA
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
DeleteFileA
TlsFree
GetSystemTime
GetThreadTimes
GetCurrentProcessId
DeleteCriticalSection
GetStringTypeW
GetModuleHandleA
FindNextFileA
GetOEMCP
GetFileType
ResetEvent
FindClose
GlobalFree
IsDBCSLeadByteEx
FlushFileBuffers
CreateFileW
GetSystemDirectoryA
GetModuleFileNameW
Beep
IsProcessorFeaturePresent
GetFileAttributesA
GetLocaleInfoW
WideCharToMultiByte
OpenProcess
TlsSetValue
SetCommTimeouts
GetCommandLineA
SetCommState
ClearCommBreak
GetWindowsDirectoryA
ExpandEnvironmentStringsA
GetCurrentThread
WaitForSingleObjectEx
SetCommBreak
SetHandleInformation
GetEnvironmentStringsW
SetEnvironmentVariableW
InitializeSListHead
GetCommState
SetDllDirectoryW
SetEndOfFile
UnmapViewOfFile
GetDateFormatW
GetEnvironmentVariableW
CreateThread
CloseHandle
FindNextFileW
CreatePipe
CreateFileMappingA
GetLocalTime
EnterCriticalSection
FindFirstFileA
GlobalUnlock
GetStartupInfoW
TerminateProcess
GetSystemTimeAdjustment
Sleep
InitializeCriticalSectionAndSpinCount
ConnectNamedPipe
GetCurrentProcess
FreeLibrary
MapViewOfFile
SwitchToThread
WriteConsoleW
user32
SetCursor
EndPaint
ShowOwnedPopups
ToAsciiEx
CheckMenuItem
SetDlgItemTextA
GetMessageA
DestroyAcceleratorTable
SetTimer
MapDialogRect
GetMessageW
PostQuitMessage
SendDlgItemMessageA
IsIconic
SetKeyboardState
SetCapture
KillTimer
MsgWaitForMultipleObjects
DrawIconEx
DeleteMenu
GetParent
SetParent
GetClientRect
CreateMenu
SetFocus
DrawEdge
SetScrollRange
CreateIconIndirect
GetQueueStatus
GetCapture
InflateRect
GetWindowPlacement
OffsetRect
GetWindowTextA
SetPropA
GetKeyboardLayout
SetRect
SetWindowLongA
GetScrollInfo
MessageBoxA
UnionRect
GetWindowLongA
PeekMessageA
DrawStateW
GetDlgItem
SetWindowsHookExA
CheckDlgButton
ShowWindow
SetMenu
AppendMenuA
CreateCaret
IsWindow
PostMessageA
RemoveMenu
CreateWindowExW
CheckRadioButton
ReleaseCapture
ScrollWindowEx
GetSystemMetrics
SendMessageW
UpdateWindow
DestroyMenu
LoadCursorA
GetCaretBlinkTime
ToUnicode
SetScrollInfo
TranslateMDISysAccel
CopyRect
RegisterClassA
ClientToScreen
HideCaret
TrackPopupMenu
IsZoomed
LoadIconA
GetWindowTextLengthA
ShowCaret
GetDC
ShowCursor
SetScrollPos
DefWindowProcA
RedrawWindow
DestroyCaret
GetDesktopWindow
DrawMenuBar
EnableScrollBar
SystemParametersInfoA
GetDlgItemTextA
DialogBoxParamA
DrawFrameControl
gdi32
BitBlt
TranslateCharsetInfo
GetWindowOrgEx
SetViewportOrgEx
LineTo
SetWindowExtEx
SetTextColor
GetCharacterPlacementW
CreateHatchBrush
DeleteDC
CreateFontA
GetDeviceCaps
GetDIBits
SetDIBColorTable
ExcludeClipRect
GetRgnBox
GetEnhMetaFileHeader
SelectObject
GetPaletteEntries
PtInRegion
PlayEnhMetaFile
CreateCompatibleBitmap
OffsetRgn
SaveDC
RealizePalette
StretchDIBits
GetCurrentPositionEx
SelectPalette
GetDIBColorTable
PolyPolygon
SetStretchBltMode
CreateRectRgn
GetSystemPaletteEntries
CreatePen
GetClipBox
SetViewportExtEx
SetROP2
RoundRect
SetTextAlign
GetPixel
EndDoc
GetStockObject
ExtTextOutA
CloseEnhMetaFile
UpdateColors
CreateSolidBrush
EndPage
SetLayout
Arc
Polygon
StretchBlt
SetPixel
CreatePalette
CreateBitmap
CreatePenIndirect
CreateRectRgnIndirect
SetMapMode
ExtCreateRegion
SetPolyFillMode
GetObjectType
GetTextExtentPointW
SetPaletteEntries
Polyline
RectVisible
IntersectClipRect
RestoreDC
TextOutA
SetWindowOrgEx
CreatePolygonRgn
ExtCreatePen
GetTextExtentExPointA
CreateBrushIndirect
advapi32
RegQueryValueExW
EqualSid
GetLengthSid
AllocateAndInitializeSid
RegDeleteValueA
LookupPrivilegeValueW
SetSecurityDescriptorDacl
OpenProcessToken
RegCloseKey
AdjustTokenPrivileges
GetUserNameA
RegDeleteKeyA
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 644KB - Virtual size: 643KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Nho Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ