Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_18f4bc9c378ae46b96bdff68e355531a_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-14_18f4bc9c378ae46b96bdff68e355531a_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_18f4bc9c378ae46b96bdff68e355531a_bkransomware
-
Size
6.7MB
-
MD5
18f4bc9c378ae46b96bdff68e355531a
-
SHA1
564cd89ec6fbc1fb491e8c7d61a0ab97406ae144
-
SHA256
bfa58f3708d1d43d063ee95209632ecb29c37b29128e19f745fc891c2059dce3
-
SHA512
76d8ee98262bc46b1ecc340252c468c01dce823793fe17ca2ea03e79be23ce0afb4302b2c3de9fa4c3997bce76d428080cbeec516ee7273e40d819856aa44278
-
SSDEEP
98304:Oto8NPXYnKGOJrUYJbxaAwKjf1fKIawA1I+OelbHGgJvYdvxYWyRVfGVkzfq6KJ:coEPXUKGOJYYza3KFawAZZpUx4fzfU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-14_18f4bc9c378ae46b96bdff68e355531a_bkransomware
Files
-
2024-09-14_18f4bc9c378ae46b96bdff68e355531a_bkransomware.exe windows:6 windows x86 arch:x86
824b8e114f8b6e171c6d7e859670b157
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
InterlockedPushEntrySList
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
SwitchToThread
ResumeThread
DeleteFileW
GetWindowsDirectoryW
IsDebuggerPresent
EnumResourceTypesW
GetThreadLocale
GetLastError
GetPrivateProfileIntW
EnumResourceNamesW
ExitThread
FileTimeToSystemTime
GetFileAttributesW
Sleep
LoadLibraryW
GetSystemDirectoryW
GetUserDefaultLCID
CompareFileTime
SystemTimeToFileTime
SetErrorMode
RtlCaptureContext
SetFilePointer
SuspendThread
GetSystemInfo
GetCPInfoExW
SetThreadLocale
VerifyVersionInfoW
ReadProcessMemory
SizeofResource
VirtualQueryEx
GetLogicalDrives
SystemTimeToTzSpecificLocalTime
LoadResource
GetFileSize
MultiByteToWideChar
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
CreateFileW
user32
ToAsciiEx
ShowOwnedPopups
GetMessageA
GetDlgItemInt
SetTimer
GetWindowRect
CharUpperBuffW
GetMessageW
SendDlgItemMessageA
RegisterWindowMessageW
SetKeyboardState
PostMessageW
MsgWaitForMultipleObjects
IsZoomed
CharLowerBuffW
DrawEdge
SetScrollRange
GetQueueStatus
GetKeyboardState
GetWindowPlacement
GetKeyboardLayout
SetRect
MessageBoxA
UnionRect
LoadMenuW
UnregisterClassA
GetClassNameW
ReleaseDC
MonitorFromWindow
GetDlgItem
ScrollWindow
EndDialog
DefWindowProcA
GetKeyState
EnumChildWindows
ShowWindow
SetMenu
IsWindow
CreateWindowExW
ScrollWindowEx
GetDlgItemTextW
SendMessageW
UpdateWindow
SetWindowTextW
SetMenuItemInfoW
SetDlgItemTextA
ValidateRect
GetMonitorInfoW
CheckMenuItem
TranslateMDISysAccel
GetMessageTime
GetSubMenu
MapDialogRect
PostQuitMessage
TrackPopupMenu
GetParent
RemovePropA
GetMenuStringW
GetWindowTextLengthA
GetMenuItemInfoW
GetDoubleClickTime
GetDC
GetMenu
GetWindowTextA
GetScrollInfo
GetWindowLongW
GetWindowLongA
GetWindowTextW
SetScrollPos
CharUpperW
RedrawWindow
SendDlgItemMessageW
GetDesktopWindow
CreatePopupMenu
AppendMenuA
PostMessageA
GetKeyboardType
ReleaseCapture
RegisterClassW
SetCaretPos
GetSysColor
gdi32
GetBitmapBits
GetTextExtentPoint32W
LineTo
SetTextColor
DeleteDC
GetDeviceCaps
CreateFontIndirectA
ExcludeClipRect
GdiFlush
CreateHalftonePalette
CreateRectRgnIndirect
Rectangle
CreateBrushIndirect
GetObjectType
SetPaletteEntries
GetTextExtentExPointA
GetCharABCWidthsFloatA
Polyline
RectVisible
SetTextAlign
IntersectClipRect
CreateDIBitmap
GetPixel
TextOutA
CreateCompatibleDC
ExtCreatePen
GetTextExtentPoint32A
SetDIBColorTable
CreatePalette
DeleteObject
GetPaletteEntries
CreateCompatibleBitmap
SaveDC
SelectPalette
GetDIBColorTable
CreatePen
EndDoc
UpdateColors
SelectClipRgn
comdlg32
FindTextW
GetOpenFileNameW
advapi32
RegUnLoadKeyW
RegSetValueExW
GetUserNameA
RegSetKeySecurity
ChangeServiceConfigW
StartServiceW
EqualSid
OpenServiceW
CloseServiceHandle
RegLoadKeyW
shell32
CommandLineToArgvW
SHGetFileInfoW
ShellExecuteExW
Shell_NotifyIconW
ExtractIconExW
oleaut32
SafeArrayPtrOfIndex
VariantChangeType
SafeArrayGetLBound
SysReAllocStringLen
SafeArrayCreate
Sections
.text Size: 686KB - Virtual size: 686KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.afn Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ