Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_ee7e2fd6692890c77dd4c58477ed730d_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_ee7e2fd6692890c77dd4c58477ed730d_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_ee7e2fd6692890c77dd4c58477ed730d_bkransomware
-
Size
594KB
-
MD5
ee7e2fd6692890c77dd4c58477ed730d
-
SHA1
974d0bf10c4a52c151bb8d47b196aac01c4e08c6
-
SHA256
41e12ae98276306c423f0478314c002d9f45236e19fd8113060af756a713473f
-
SHA512
f9bf9edff793233849e94eebf1e30b356da366752ad2baeb1b573f3236cd725196c94130ad3b6672b186bd88449411403647e361b08c8f90b1358d3072883956
-
SSDEEP
12288:IHZVXswSE1qwU4uOlrw55nVEVcAEZY7u5MvlkbeWZh3TAVaNhM8jYbS/W:sVXME1VUx2r9VcAEW74ulkbe2dsIJk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-14_ee7e2fd6692890c77dd4c58477ed730d_bkransomware
Files
-
2024-09-14_ee7e2fd6692890c77dd4c58477ed730d_bkransomware.exe windows:5 windows x86 arch:x86
626d88c4fb5642f625fd042edb0a8ea9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
SetPixel
GetObjectType
GetFontUnicodeRanges
GetTextCharacterExtra
GetTextAlign
UpdateColors
GetPixelFormat
GetFontLanguageInfo
GetPolyFillMode
GetTextCharsetInfo
GetMetaRgn
GetRandomRgn
GetStretchBltMode
GetTextColor
SetTextColor
SetSystemPaletteUse
SetTextCharacterExtra
GetGraphicsMode
GetTextCharset
SetTextAlign
SetTextJustification
GetSystemPaletteUse
user32
GetCursor
GetKeyboardType
GetMenuCheckMarkDimensions
GetForegroundWindow
GetWindowContextHelpId
GetWindowDC
SendMessageA
GetQueueStatus
CallWindowProcA
GetMenuState
GetScrollPos
SetDlgItemTextA
GetDC
IsWindowEnabled
MoveWindow
GetDlgItemInt
GetMenuContextHelpId
GetMenu
EndDialog
EnableWindow
RemovePropA
LoadIconA
GetInputState
GetDlgItem
WindowFromDC
SetFocus
PostMessageA
ShowWindow
BeginPaint
GetWindowLongA
GetMenuItemCount
CheckDlgButton
GetMenuItemID
EndPaint
IsWindowUnicode
kernel32
GetTimeZoneInformation
GetFullPathNameA
FlushFileBuffers
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
DeleteFileW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFileAttributesExW
SetStdHandle
CreatePipe
GetExitCodeProcess
WaitForSingleObject
ReadConsoleW
SetFilePointerEx
RaiseException
GetStringTypeW
GetFileType
GetProcAddress
GetModuleHandleA
SetFilePointer
IsProcessorFeaturePresent
GetLastError
GlobalAlloc
GlobalSize
GetProcessHeap
GlobalHandle
GetCurrentProcessId
GetVersion
GetDriveTypeA
GetCurrentProcess
DeleteFileA
MoveFileA
GetCurrentThreadId
GetStdHandle
GetTickCount
FindClose
QueryPerformanceCounter
FindResourceA
LockResource
IsDebuggerPresent
LoadResource
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
ReadFile
CloseHandle
DuplicateHandle
CreateProcessA
GetLocalTime
GetFullPathNameW
DeleteCriticalSection
GetCommandLineA
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetConsoleCP
GetConsoleMode
SetEndOfFile
Sections
.text Size: 524KB - Virtual size: 523KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE