Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_4c06288fe08e2b95fd59003593b00294_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_4c06288fe08e2b95fd59003593b00294_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_4c06288fe08e2b95fd59003593b00294_bkransomware
-
Size
563KB
-
MD5
4c06288fe08e2b95fd59003593b00294
-
SHA1
1df6b809db14cad486bb86a3ad92903d1e41c225
-
SHA256
e9649c07b1426989b39df168969cd1b45694d1fee9f30618af1611845a71a3f6
-
SHA512
e9f90617366b3102eb5f53ad227e9fb564945cc8e6d12efc5834870ebc33634c1479e331dea2cb0fb571f27a76ab128b58c7307c282b688ce392261950967d2e
-
SSDEEP
12288:fGW07j6Pgj6fflU3YL/TwoXkZIefVeBS1V:f507j6PgsU3A8oX2IKv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-19_4c06288fe08e2b95fd59003593b00294_bkransomware
Files
-
2024-09-19_4c06288fe08e2b95fd59003593b00294_bkransomware.exe windows:5 windows x86 arch:x86
28b66da6f33509a92c328cb443f9ac35
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetGraphicsMode
GetSystemPaletteUse
GetObjectType
SetTextCharacterExtra
GetPixelFormat
GetNearestColor
SetTextColor
GetTextColor
GetTextCharacterExtra
UpdateColors
GetTextAlign
GetMapMode
SetSystemPaletteUse
GetClipRgn
GetPolyFillMode
GetTextCharset
GetNearestPaletteIndex
GetTextCharsetInfo
SetTextAlign
GetFontUnicodeRanges
GetMetaRgn
SetPixel
GetRandomRgn
GetDCBrushColor
user32
GetKeyboardType
GetCursor
GetMenuContextHelpId
GetMenuItemID
GetPropA
EnableWindow
GetMenu
EndPaint
GetMenuItemCount
GetForegroundWindow
RemovePropA
GetScrollPos
GetQueueStatus
WindowFromDC
GetWindowLongA
GetDlgItem
GetInputState
BeginPaint
DrawTextA
GetMenuState
ShowWindow
PostMessageA
SetDlgItemTextA
GetWindowDC
SetFocus
CheckDlgButton
EndDialog
LoadIconA
GetMenuCheckMarkDimensions
IsWindowUnicode
kernel32
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
WriteConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
OutputDebugStringW
QueryPerformanceCounter
GetModuleFileNameA
ReadConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileAttributesExW
ReadFile
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
RaiseException
SetStdHandle
GetFileType
GetProcAddress
GetModuleHandleA
GetLastError
SetFilePointer
GetFileTime
LockResource
DeleteFileA
GlobalHandle
SizeofResource
GetStdHandle
LocalFlags
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
FindResourceA
GlobalFlags
IsProcessorFeaturePresent
IsDebuggerPresent
CloseHandle
GetTickCount
MoveFileA
GetProcessHeap
GlobalAlloc
GlobalSize
WriteFile
GetDriveTypeA
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetSystemTimeAsFileTime
GetFullPathNameW
GetLocalTime
GetFullPathNameA
GetTimeZoneInformation
GetCommandLineA
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
RtlUnwind
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStringTypeW
SetEndOfFile
Sections
.text Size: 507KB - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE