Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_f1543333affb56fa4816e0c419eb3a37_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-13_f1543333affb56fa4816e0c419eb3a37_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_f1543333affb56fa4816e0c419eb3a37_bkransomware
-
Size
601KB
-
MD5
f1543333affb56fa4816e0c419eb3a37
-
SHA1
45a634bcdea6893c3b559a8e860cd2a452da89dc
-
SHA256
06f7f28a33be5776a251707b908c06758a01551e54454dfca0a629665dae69ca
-
SHA512
ff92000524fb8174c80f43d3c1fc0e5b8a452bab4833daf13dc720bfe63c1113b25ae30c18a152d3df67390c152268d5b5359cc35ee81594199f99ea578867a5
-
SSDEEP
12288:cOJ6jMYVI+RbIW3CIkvQeApRIYDmr2z09hOThPxu:DetquMWbeE61OP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_f1543333affb56fa4816e0c419eb3a37_bkransomware
Files
-
2024-09-13_f1543333affb56fa4816e0c419eb3a37_bkransomware.exe windows:5 windows x86 arch:x86
65235ac7e3441a0945c2c5cee885db2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetPolyFillMode
GetRandomRgn
UpdateColors
GetStretchBltMode
GetSystemPaletteUse
SetTextCharacterExtra
GetFontUnicodeRanges
GetObjectType
GetPixelFormat
GetNearestPaletteIndex
GetTextCharsetInfo
GetFontLanguageInfo
GetMetaRgn
SetTextJustification
GetDCPenColor
GetClipRgn
GetMapMode
user32
GetKeyboardType
GetWindowLongA
LoadIconA
EndPaint
DrawTextA
CallWindowProcA
MoveWindow
IsWindowUnicode
SetDlgItemTextA
GetMenuContextHelpId
EnableWindow
BeginPaint
RemovePropA
WindowFromDC
GetMenuItemCount
PostMessageA
GetMenuItemID
ShowWindow
GetDlgItemInt
SetWindowTextA
SetFocus
GetPropA
GetDialogBaseUnits
GetCursor
GetMenuState
CheckDlgButton
GetScrollPos
SendMessageA
GetMenuCheckMarkDimensions
GetInputState
EndDialog
GetWindowContextHelpId
GetQueueStatus
GetWindowDC
GetMenu
IsWindowEnabled
GetDlgItem
kernel32
SetEnvironmentVariableA
SetEndOfFile
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
GetFullPathNameA
GetStringTypeW
GetCurrentThread
GetFileAttributesExW
SetStdHandle
ReadConsoleW
DeleteFileW
RaiseException
SetFilePointerEx
GetConsoleMode
GetConsoleCP
RtlUnwind
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetProcAddress
GetModuleHandleA
GlobalFlags
MoveFileA
FindResourceA
GetFileType
IsDebuggerPresent
GlobalHandle
LoadResource
GetDriveTypeA
QueryPerformanceCounter
SetFilePointer
GlobalAlloc
WriteFile
SizeofResource
FlushFileBuffers
IsProcessorFeaturePresent
GetLastError
GetTickCount
GlobalSize
GetFileTime
LocalFlags
GetCurrentProcessId
DeleteFileA
LockResource
GetCurrentThreadId
CloseHandle
GetProcessHeap
GetVersion
GetCurrentProcess
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetTempPathW
ReadFile
Beep
Sleep
GetTimeZoneInformation
SetErrorMode
GetFullPathNameW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
SetEnvironmentVariableW
Sections
.text Size: 533KB - Virtual size: 532KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE