Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_b663047ab16c911beaccfe97f241ea7e_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_b663047ab16c911beaccfe97f241ea7e_bkransomware.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-09-13_b663047ab16c911beaccfe97f241ea7e_bkransomware
-
Size
500KB
-
MD5
b663047ab16c911beaccfe97f241ea7e
-
SHA1
afc05a4e3627c97fad845a8b732834af9fcaed36
-
SHA256
c98bdd274ec3b4c1b22891eb6b7f96b2a982f4b6ce8ee5d519a51509bbadc380
-
SHA512
4e7c465fad37322f022b9e02cd60f1c0e0ab9394caf5cfec7c5ccd6a780d9f14de97801b09f330613f65ec52fc1c0d86bf83fa1314c97df050a681a010327043
-
SSDEEP
12288:cDO/XH/NsvVdy7SgjGUHjLfU8nDZtqPzzzzzzzz:NHVaZgh/MSDLqPzzzzzzzz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_b663047ab16c911beaccfe97f241ea7e_bkransomware
Files
-
2024-09-13_b663047ab16c911beaccfe97f241ea7e_bkransomware.exe windows:5 windows x86 arch:x86
ce32060f8ed5213d11afc414b4a6da15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetNearestPaletteIndex
SetTextJustification
GetFontLanguageInfo
GetGraphicsMode
GetTextCharsetInfo
GetDCPenColor
GetClipRgn
GetTextColor
GetObjectType
GetPixelFormat
GetPolyFillMode
GetFontUnicodeRanges
GetCurrentObject
user32
GetMenuState
GetMenu
GetQueueStatus
IsWindowEnabled
EndPaint
GetMenuCheckMarkDimensions
MoveWindow
RemovePropA
GetForegroundWindow
LoadIconA
GetPropA
GetMenuContextHelpId
PostMessageA
SendMessageA
SetFocus
GetKeyboardType
DrawTextA
BeginPaint
GetDC
IsWindowUnicode
ShowWindow
GetMenuItemCount
EnableWindow
CheckDlgButton
CallWindowProcA
GetInputState
SetDlgItemTextA
GetDlgItem
GetDlgItemInt
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
FindClose
WriteFile
GetCurrentThreadId
GetTickCount
GetVersion
MoveFileA
GetCurrentProcess
IsProcessorFeaturePresent
GetDriveTypeA
LocalFlags
SizeofResource
GetFileType
QueryPerformanceCounter
IsDebuggerPresent
FlushFileBuffers
GetFileTime
GetStdHandle
GetLastError
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
SetLastError
GetCurrentThread
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEnvironmentVariableA
Sections
.text Size: 434KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE