Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_07a1b592c86dc99194c08c278d87227d_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-21_07a1b592c86dc99194c08c278d87227d_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-21_07a1b592c86dc99194c08c278d87227d_bkransomware
-
Size
581KB
-
MD5
07a1b592c86dc99194c08c278d87227d
-
SHA1
0971ea0396cb190bac9b9463535863ce9b1408e7
-
SHA256
02c3fda7f098e718765f00233936b2e43b14ab18c31662309105b80078827b4f
-
SHA512
3bd26250ad9276ee4c51b5ba5c9e1e01f49698f691f18ab0df5adac8102a2f0f6fc6480dcb3afa4578e6bf6d1af9f2d72893e004512a9fb83e303dc8dec56661
-
SSDEEP
12288:CkC6t3CSxyoiZF4OFQp3bMV1kluXW75MjSgx7:H4Sxyoiw9Tv75Mu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-21_07a1b592c86dc99194c08c278d87227d_bkransomware
Files
-
2024-09-21_07a1b592c86dc99194c08c278d87227d_bkransomware.exe windows:5 windows x86 arch:x86
507563a6ea31f38f3e8f6b7b2f6a1ff7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextJustification
GetStretchBltMode
GetDCBrushColor
UpdateColors
GetTextCharacterExtra
GetClipRgn
GetCurrentObject
GetSystemPaletteUse
GetTextColor
GetMapMode
SetPixel
GetTextAlign
GetRandomRgn
GetBkColor
GetDCPenColor
GetTextCharset
GetMetaRgn
GetTextCharsetInfo
GetFontLanguageInfo
GetFontUnicodeRanges
GetNearestColor
GetDeviceCaps
SetTextColor
GetGraphicsMode
SetSystemPaletteUse
GetNearestPaletteIndex
user32
IsWindowUnicode
CallWindowProcA
GetDC
GetWindowDC
GetCursor
GetScrollPos
WindowFromDC
GetMenuItemCount
EnableWindow
GetKeyboardType
SendMessageA
GetWindowLongA
DrawTextA
GetMenuCheckMarkDimensions
SetFocus
GetWindowContextHelpId
SetWindowTextA
GetMenuContextHelpId
IsWindowEnabled
ShowWindow
GetMenu
GetMenuState
GetInputState
GetDlgItemInt
GetMenuItemID
BeginPaint
CheckDlgButton
PostMessageA
LoadIconA
EndDialog
SetDlgItemTextA
GetDlgItem
GetQueueStatus
MoveWindow
GetForegroundWindow
kernel32
WriteConsoleW
ReadConsoleW
ReadFile
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
SetStdHandle
RaiseException
SetEnvironmentVariableW
SetEnvironmentVariableA
GetConsoleMode
GetConsoleCP
MoveFileExW
SetFilePointerEx
GetFileAttributesExW
GetTimeZoneInformation
GetStringTypeW
DeleteFileW
GetFileType
RtlUnwind
GetModuleHandleA
GetProcAddress
GetTickCount
GetDriveTypeA
DeleteFileA
GetLastError
IsProcessorFeaturePresent
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CloseHandle
LockResource
WriteFile
GetFileTime
GetStdHandle
IsDebuggerPresent
GetVersion
GlobalSize
FlushFileBuffers
GlobalHandle
FindResourceA
SizeofResource
GlobalAlloc
FindClose
GetProcessHeap
SetFilePointer
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
SetErrorMode
GetFullPathNameW
DeleteCriticalSection
GetFullPathNameA
GetLocalTime
GetTempPathW
GetTempPathA
HeapReAlloc
GetCommandLineA
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetEndOfFile
Sections
.text Size: 524KB - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE