Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_1f7166fcdb010c80027c755544b99a28_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_1f7166fcdb010c80027c755544b99a28_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_1f7166fcdb010c80027c755544b99a28_bkransomware
-
Size
562KB
-
MD5
1f7166fcdb010c80027c755544b99a28
-
SHA1
13bb1e4e96d42cc131f55a4d0a3c17082f87b6e3
-
SHA256
a41b0bae39a835533e2c6124f3b374701b586a7c737d2bd755a00cffbcb44b63
-
SHA512
efebb46b0a4adcccd4e12de422fdd035021f8715de305c51b1762b696c85b75aded7ade5a97d623f230ede2ccdb97fb8aff2f7f5ae0f93af908fdb27d3e12209
-
SSDEEP
12288:EiHxkTLyQIejo/gyB7g/klim2d2LktiYSZWIbIOAm4CKJg:EiGlIv/nB7gaib2CiY5OIh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-14_1f7166fcdb010c80027c755544b99a28_bkransomware
Files
-
2024-09-14_1f7166fcdb010c80027c755544b99a28_bkransomware.exe windows:5 windows x86 arch:x86
6b59ba2de1916e24af9b476914450cd3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStretchBltMode
SetTextAlign
GetFontUnicodeRanges
GetPixelFormat
GetBkColor
GetGraphicsMode
GetNearestColor
GetMapMode
GetTextAlign
GetTextCharacterExtra
SetPixel
GetClipRgn
UpdateColors
GetTextColor
GetTextCharset
GetNearestPaletteIndex
user32
CallWindowProcA
MoveWindow
GetKeyboardType
ShowWindow
GetMenu
WindowFromDC
GetDlgItemInt
EndPaint
GetDC
RemovePropA
GetMenuItemCount
IsWindowUnicode
GetWindowDC
GetDialogBaseUnits
EndDialog
GetInputState
GetScrollPos
EnableWindow
GetMenuCheckMarkDimensions
GetMenuItemID
GetMenuState
PostMessageA
CheckDlgButton
GetForegroundWindow
GetWindowLongA
GetDlgItem
DrawTextA
SetFocus
BeginPaint
SendMessageA
IsWindowEnabled
SetWindowTextA
LoadIconA
GetQueueStatus
GetPropA
GetMenuContextHelpId
GetWindowContextHelpId
SetDlgItemTextA
kernel32
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
ReadConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
SetEnvironmentVariableW
SetEnvironmentVariableA
RaiseException
SetFilePointerEx
FlushFileBuffers
GetFileAttributesExW
GetStringTypeW
ReadFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetProcAddress
GetModuleHandleA
GetCurrentProcess
GetCurrentProcessId
GetFileTime
GetLastError
GlobalHandle
LocalFlags
GetStdHandle
WriteFile
SizeofResource
GetFileType
DeleteFileA
GetCurrentThreadId
GetProcessHeap
GetDriveTypeA
GlobalFlags
GetTickCount
LockResource
SetFilePointer
MoveFileA
GlobalSize
FindClose
GlobalAlloc
IsDebuggerPresent
GetVersion
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameA
GetLocalTime
Beep
Sleep
DeleteFileW
GetTempPathW
GetTimeZoneInformation
GetCommandLineA
IsProcessorFeaturePresent
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEndOfFile
Sections
.text Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE