Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_5a0baa63a45c7d14d6e4bc8369b4fdec_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_5a0baa63a45c7d14d6e4bc8369b4fdec_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_5a0baa63a45c7d14d6e4bc8369b4fdec_bkransomware
-
Size
502KB
-
MD5
5a0baa63a45c7d14d6e4bc8369b4fdec
-
SHA1
72d577f56771ef770221f24188cbdcdc6f3799f9
-
SHA256
4e5b292c452ce2f3995a772729403df6c6db544ec38b6011e2328326146c3178
-
SHA512
f25fd0455563d84255a08343eb8075d8679cafb81373f66c3be0dcc4aa8b9ca495a7ed52016aab4da80384939f673e92c8ff435644113791d3586aaf735581ce
-
SSDEEP
12288:28G7Kt68z9BIpeyDoegR07c3Pl6rpxXOwlQWlG:2zKt68z9CpefRvl6rpxXLqWl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-14_5a0baa63a45c7d14d6e4bc8369b4fdec_bkransomware
Files
-
2024-09-14_5a0baa63a45c7d14d6e4bc8369b4fdec_bkransomware.exe windows:5 windows x86 arch:x86
7c0585965433601320ecb162f8020a34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetMapMode
GetTextColor
SetTextCharacterExtra
GetFontLanguageInfo
SetTextAlign
GetClipRgn
GetNearestPaletteIndex
SetTextColor
GetNearestColor
GetMetaRgn
SetTextJustification
UpdateColors
GetTextCharset
GetGraphicsMode
GetObjectType
GetBkColor
user32
EnableWindow
GetPropA
GetMenuItemCount
GetDC
GetMenuItemID
GetWindowDC
GetScrollPos
IsWindowEnabled
BeginPaint
EndDialog
PostMessageA
GetDialogBaseUnits
RemovePropA
SetFocus
GetMenu
GetForegroundWindow
GetKeyboardType
ShowWindow
GetMenuCheckMarkDimensions
GetMenuState
GetQueueStatus
CallWindowProcA
GetWindowContextHelpId
SendMessageA
GetDlgItem
CheckDlgButton
SetWindowTextA
GetWindowLongA
GetCursor
IsWindowUnicode
GetInputState
EndPaint
GetDlgItemInt
DrawTextA
SetDlgItemTextA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
GetConsoleMode
GetProcAddress
GetModuleHandleA
CloseHandle
DeleteFileA
GetFileType
GetCurrentProcessId
IsDebuggerPresent
GetVersion
FindResourceA
GetLastError
IsProcessorFeaturePresent
GetStdHandle
MoveFileA
GetTickCount
SetFilePointer
GetCurrentThreadId
LoadResource
GetProcessHeap
GetCurrentProcess
GlobalSize
GlobalHandle
GetDriveTypeA
GlobalAlloc
FlushFileBuffers
SizeofResource
GlobalFlags
LocalFlags
LockResource
GetFileTime
HeapFree
HeapAlloc
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimeAsFileTime
GetCommandLineA
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetConsoleCP
SetEnvironmentVariableA
Sections
.text Size: 451KB - Virtual size: 451KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE