Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_a5bbb71c0655e5cf421114ac695631e8_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_a5bbb71c0655e5cf421114ac695631e8_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_a5bbb71c0655e5cf421114ac695631e8_bkransomware
-
Size
503KB
-
MD5
a5bbb71c0655e5cf421114ac695631e8
-
SHA1
91e173534455f1938405ba89a8df653a1642ef3a
-
SHA256
df5094487dacb99a15b51b3501dace39ec06e8bf33c29a25a6decf3b2fb3009c
-
SHA512
c7d113573338a56f0092296da924430639e666181e68383d66add3f80b9c5eec2b3b3cb952d0148e396020d6aee40900fa4931a6334b046e56872c02f27c7061
-
SSDEEP
6144:WDMXnUXu/sWkSF7DLaRNjuF2Y0W67vVIvqvgIdHoN9yDts2emGZkhdZ2lih5Q/+m:sASboDEVvgIN4F6dZ4ihIXj+y6i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-14_a5bbb71c0655e5cf421114ac695631e8_bkransomware
Files
-
2024-09-14_a5bbb71c0655e5cf421114ac695631e8_bkransomware.exe windows:5 windows x86 arch:x86
3625c2744796eda164234aed517c2e10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStretchBltMode
GetPolyFillMode
UpdateColors
GetRandomRgn
GetSystemPaletteUse
SetPixel
GetClipRgn
GetMetaRgn
GetPixelFormat
GetTextCharacterExtra
GetTextColor
GetCurrentObject
GetDeviceCaps
GetBkColor
GetTextCharsetInfo
GetTextAlign
GetGraphicsMode
GetMapMode
user32
MoveWindow
RemovePropA
DrawTextA
GetWindowDC
GetMenuItemCount
CheckDlgButton
GetMenuState
WindowFromDC
BeginPaint
GetDlgItemInt
GetMenuItemID
GetMenuContextHelpId
ShowWindow
EnableWindow
GetInputState
GetMenu
PostMessageA
GetDlgItem
SetWindowTextA
GetWindowLongA
GetDialogBaseUnits
GetWindowContextHelpId
IsWindowUnicode
GetScrollPos
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetProcAddress
GetModuleHandleA
GlobalHandle
GetVersion
LoadResource
IsDebuggerPresent
GetLastError
GlobalFlags
SizeofResource
IsProcessorFeaturePresent
LocalFlags
SetFilePointer
GetStdHandle
GetTickCount
GlobalAlloc
GetProcessHeap
GetCurrentProcessId
FindClose
GetDriveTypeA
GetCurrentThreadId
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetFilePointerEx
SetEnvironmentVariableA
Sections
.text Size: 435KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE