Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_7e22d2dea68a1b69c848d78decc29086_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_7e22d2dea68a1b69c848d78decc29086_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-15_7e22d2dea68a1b69c848d78decc29086_bkransomware
-
Size
501KB
-
MD5
7e22d2dea68a1b69c848d78decc29086
-
SHA1
46791bd18964a331bd8503bf8a05efba3eb17b80
-
SHA256
3d34e8b2baa7312bcddb4a309828b97c8a589faf8c7d17c7d93b609489a0f126
-
SHA512
c58f842ae58a269c96cf82e0f276c53b7202cfa16cce3fed3e7b3daa5380f8b265140604f3848b780e650c32db584bbbceedbd2770b9f7ce48e4425901d37256
-
SSDEEP
12288:ZZOTqkSLtpgyeURMWxGb6LFKDzRoGM+J:vwqF0ya6pKzO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-15_7e22d2dea68a1b69c848d78decc29086_bkransomware
Files
-
2024-09-15_7e22d2dea68a1b69c848d78decc29086_bkransomware.exe windows:5 windows x86 arch:x86
d9c55c00f95262c6e6841874a1579a91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetFontUnicodeRanges
GetDCBrushColor
SetTextJustification
GetTextColor
GetStretchBltMode
GetDCPenColor
GetTextAlign
UpdateColors
SetPixel
GetCurrentObject
GetClipRgn
GetMapMode
SetTextAlign
SetSystemPaletteUse
GetRandomRgn
GetMetaRgn
GetNearestColor
user32
WindowFromDC
GetQueueStatus
PostMessageA
GetMenuCheckMarkDimensions
CheckDlgButton
GetCursor
GetMenuState
GetInputState
GetMenuItemID
GetKeyboardType
IsWindowEnabled
GetWindowLongA
ShowWindow
GetMenu
EnableWindow
GetForegroundWindow
GetMenuItemCount
EndPaint
DrawTextA
GetPropA
GetWindowContextHelpId
SetDlgItemTextA
GetWindowDC
LoadIconA
IsWindowUnicode
GetDlgItemInt
GetDlgItem
GetScrollPos
EndDialog
BeginPaint
SendMessageA
SetFocus
RemovePropA
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
FlushFileBuffers
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
GetProcAddress
GetModuleHandleA
SizeofResource
GetFileType
GetCurrentProcessId
FindClose
GetVersion
GetLastError
CloseHandle
IsDebuggerPresent
DeleteFileA
FindResourceA
GlobalHandle
GetTickCount
LockResource
GetCurrentThreadId
SetFilePointer
GetCurrentProcess
GlobalFlags
GlobalSize
LocalFlags
GetFileTime
GlobalAlloc
GetProcessHeap
GetStdHandle
GetDriveTypeA
LoadResource
IsProcessorFeaturePresent
MoveFileA
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
SetEnvironmentVariableA
Sections
.text Size: 452KB - Virtual size: 452KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE