Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_b91d5ce05328f04d1894af9db2fab31f_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-13_b91d5ce05328f04d1894af9db2fab31f_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_b91d5ce05328f04d1894af9db2fab31f_bkransomware
-
Size
6.6MB
-
MD5
b91d5ce05328f04d1894af9db2fab31f
-
SHA1
92ae5fa8645245630f337ef2d9346642cbb9093a
-
SHA256
adb4e0d5da9cec14068cd64f9622fe2292e3bc89880ec6454ca5ca8ccf58dfae
-
SHA512
a2ee5143f444deb79bab752c03a1485be2f5ae2904abf547cf2749eeef7db997d49ba13073ca9c5054f08b4332df7c180bf7c0d0843f6c092a77af17b983113a
-
SSDEEP
196608:WQ0DhPjJN0OoDGxqKXo2jMeusF+su9Ow:Wx9JuOofKXjAeXISw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_b91d5ce05328f04d1894af9db2fab31f_bkransomware
Files
-
2024-09-13_b91d5ce05328f04d1894af9db2fab31f_bkransomware.exe windows:6 windows x86 arch:x86
6cb5c8a918cc4e4502c231572681b8f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
ResumeThread
GetDateFormatW
GetLocaleInfoA
MapViewOfFile
GetDriveTypeW
GetCPInfo
VirtualQuery
GetSystemDefaultUILanguage
FindResourceW
LoadResource
SystemTimeToFileTime
GetCurrentProcess
CompareFileTime
InitializeSListHead
GetEnvironmentStringsW
CreateDirectoryW
SetHandleInformation
GlobalLock
GetUserDefaultLCID
WaitForSingleObject
SignalObjectAndWait
GetLogicalDrives
SetCommBreak
ConnectNamedPipe
GetTickCount
GetCurrentThread
ExpandEnvironmentStringsA
GetProcessTimes
OpenProcess
GetConsoleCP
IsValidLocale
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
SizeofResource
ReadProcessMemory
FormatMessageW
LeaveCriticalSection
HeapCreate
GetExitCodeProcess
Beep
CreateProcessA
TerminateProcess
GetSystemDirectoryA
CreateFileW
GetOverlappedResult
GetACP
SetThreadPriority
WritePrivateProfileStringW
FlushFileBuffers
GetTempPathW
RaiseException
VerifyVersionInfoW
SetThreadLocale
GetLastError
IsDBCSLeadByteEx
VirtualAlloc
CreateNamedPipeA
EnterCriticalSection
GlobalFree
ResetEvent
GetLocalTime
GetExitCodeThread
RemoveDirectoryW
QueryDosDeviceW
EnumResourceTypesW
GetModuleFileNameA
FindNextFileA
GetStringTypeW
GetUserDefaultUILanguage
GetCurrentProcessId
WinExec
CloseHandle
FileTimeToLocalFileTime
DeleteFileW
OpenFileMappingA
SuspendThread
lstrcpyW
DeleteFileA
ExpandEnvironmentStringsW
CreateThread
SwitchToThread
SetStdHandle
SetFilePointerEx
GetConsoleMode
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
WriteConsoleW
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
GetVersion
TlsAlloc
FindNextFileW
IsDebuggerPresent
GetOEMCP
DeviceIoControl
CreateEventW
LoadLibraryA
FindClose
GetDiskFreeSpaceW
SetLastError
GetCPInfoExW
GetPrivateProfileIntW
GlobalUnlock
MultiByteToWideChar
ExitThread
FileTimeToSystemTime
GetFileAttributesW
lstrcpynW
GetFileAttributesA
GetVersionExW
GetSystemTimeAdjustment
Sleep
LoadLibraryW
GetCommandLineA
WideCharToMultiByte
ClearCommBreak
SetCommState
GetWindowsDirectoryA
GetPrivateProfileStringW
VirtualFree
GetModuleHandleExW
SetEnvironmentVariableW
WaitNamedPipeA
EnumCalendarInfoW
LoadLibraryExW
SystemTimeToTzSpecificLocalTime
SetEndOfFile
UnmapViewOfFile
SetFilePointer
GetFileSize
CreateFileA
EnumResourceNamesW
GetEnvironmentVariableW
GetCommandLineW
DeleteCriticalSection
GetFullPathNameW
TlsGetValue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
DuplicateHandle
user32
GetDlgCtrlID
CheckMenuItem
EndPaint
ClientToScreen
DestroyAcceleratorTable
GetMessageW
CharNextW
RegisterWindowMessageW
IsIconic
PostMessageW
GetSubMenu
DrawIconEx
LoadStringA
AttachThreadInput
DrawTextExW
ModifyMenuW
EnumWindows
DrawFocusRect
SetDlgItemInt
GetMenu
CheckMenuRadioItem
MessageBoxA
SystemParametersInfoW
GetClassNameW
CharUpperW
SetWindowLongW
DestroyCursor
ShowWindow
GetSysColorBrush
CreateWindowExW
InsertMenuW
BeginDeferWindowPos
ValidateRgn
SendMessageW
UpdateWindow
EndMenu
DestroyMenu
DestroyIcon
DrawFrameControl
SetMenuItemInfoW
GetMonitorInfoW
CopyRect
IsRectEmpty
GetDlgItemInt
GetWindowInfo
GetMenuItemInfoW
GetDC
LoadMenuW
SendDlgItemMessageW
GetDesktopWindow
EnumChildWindows
DrawMenuBar
GetKeyboardType
MessageBoxW
GetDlgItemTextW
SetDlgItemTextW
GetMenuItemCount
gdi32
SetWindowOrgEx
PolyPolygon
Arc
GetTextExtentPoint32W
ExtFloodFill
GetMetaFileBitsEx
SetTextColor
CreateFontIndirectW
GetEnhMetaFileHeader
GetRegionData
CombineRgn
RectInRegion
Ellipse
StretchDIBits
SetStretchBltMode
SetViewportExtEx
SetWinMetaFileBits
CreateEnhMetaFileW
SetWindowExtEx
StretchBlt
PtInRegion
PlayEnhMetaFile
OffsetRgn
GetObjectW
CreatePolygonRgn
comdlg32
FindTextW
advapi32
RegEnumKeyExW
ControlService
RegSetKeySecurity
ChangeServiceConfigW
QueryServiceStatus
RegOpenKeyExA
LookupPrivilegeValueW
SetSecurityDescriptorDacl
OpenProcessToken
CloseServiceHandle
RegCloseKey
SetSecurityDescriptorOwner
RegDeleteValueA
RegConnectRegistryW
RegGetKeySecurity
RegDeleteKeyA
OpenSCManagerW
RegUnLoadKeyW
shell32
ShellExecuteExW
ole32
CoTaskMemFree
oleaut32
VariantChangeType
SysFreeString
SysAllocStringLen
VariantInit
SafeArrayCreate
VariantCopy
VariantClear
SysReAllocStringLen
SafeArrayPtrOfIndex
Sections
.text Size: 673KB - Virtual size: 672KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rQM Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ