Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_2e8fdd3e12efed92deaf268a02a7db45_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-25_2e8fdd3e12efed92deaf268a02a7db45_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_2e8fdd3e12efed92deaf268a02a7db45_bkransomware
-
Size
6.7MB
-
MD5
2e8fdd3e12efed92deaf268a02a7db45
-
SHA1
8d55f6d954c5319524221d74575ad79846d425e7
-
SHA256
d3c90871023fef9cb6a2bec2ceb7d44f7dbe540e83aed21db228fb03727aaa60
-
SHA512
ccdcea2e4f5f957ed5d9cb9a9ffa9fa1b806ef8787288046bef1d863f872c059f9eb495c8debc0c31f06e4d8a63e54420dd168006bb4602e9a6c316da0b0474e
-
SSDEEP
196608:GPppfWEab0Nc87IUWwfoQDp0L5DHwIS6yC+dsrgOlF:uFWEa2ce3WwAQt0L5DQISlC+/Oz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-25_2e8fdd3e12efed92deaf268a02a7db45_bkransomware
Files
-
2024-09-25_2e8fdd3e12efed92deaf268a02a7db45_bkransomware.exe windows:6 windows x86 arch:x86
14bad119ba4f8778ff76615d5a533617
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
LCMapStringW
HeapSize
WideCharToMultiByte
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlushFileBuffers
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateThread
TlsFree
GetEnvironmentVariableW
CloseHandle
DeleteCriticalSection
FindNextFileW
FindNextFileA
GetOEMCP
CreatePipe
SetLastError
RaiseException
GlobalUnlock
GetTimeZoneInformation
TerminateProcess
MulDiv
IsProcessorFeaturePresent
LeaveCriticalSection
Sleep
GetLocaleInfoW
TlsSetValue
SetCommTimeouts
SetCommState
GetTickCount
WaitForSingleObjectEx
HeapFree
LoadLibraryExW
GetCPInfo
GetLocaleInfoA
GlobalMemoryStatus
GetCommandLineW
ExitProcess
LoadLibraryA
DeleteFileA
GetCurrentProcessId
GetStringTypeW
GetModuleHandleA
GetModuleFileNameA
CreateEventW
CreateFileMappingA
MultiByteToWideChar
GetACP
GetSystemDirectoryA
GetFileAttributesA
CreateEventA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
OpenProcess
ExpandEnvironmentStringsA
SetCommBreak
WaitForSingleObject
QueryPerformanceCounter
WaitNamedPipeA
SetEndOfFile
CreateFileA
HeapAlloc
RtlUnwind
HeapReAlloc
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
EncodePointer
DecodePointer
GetLastError
CreateFileW
user32
DestroyWindow
GetMessageA
SetWindowRgn
HideCaret
GetWindowRect
MapDialogRect
GetMessageW
PostQuitMessage
KillTimer
GetParent
SetParent
CreateMenu
GetWindowTextLengthA
EnumWindows
DrawFocusRect
GetWindowTextA
GetScrollInfo
MessageBoxA
SetClassLongA
RedrawWindow
DestroyCursor
GetSysColor
ShowWindow
SetMenu
DrawMenuBar
CreateWindowExW
CheckRadioButton
SystemParametersInfoA
ReleaseCapture
BeginDeferWindowPos
GetSystemMetrics
InsertMenuA
SendMessageW
UpdateWindow
CheckMenuItem
RegisterClassA
ReleaseDC
ShowOwnedPopups
EndPaint
ClientToScreen
DestroyAcceleratorTable
SetTimer
CreateDialogParamA
IsZoomed
DeleteMenu
RemovePropA
MessageBeep
SetScrollRange
GetDC
InflateRect
SetWindowLongA
UnionRect
InvalidateRect
SetScrollPos
EnableMenuItem
GetDlgItem
ScrollWindow
SetWindowsHookExA
DestroyCaret
GetDesktopWindow
IsDlgButtonChecked
EnableScrollBar
IsWindow
MessageBoxW
ValidateRgn
EndMenu
DialogBoxParamA
DrawFrameControl
ValidateRect
GetWindowThreadProcessId
DestroyIcon
gdi32
GetBitmapBits
ExtCreatePen
CreatePolygonRgn
SetWindowOrgEx
PolyPolygon
TranslateCharsetInfo
ExtFloodFill
SetWindowExtEx
MaskBlt
GetCharacterPlacementW
Polygon
SetBkColor
CreateHalftonePalette
SelectObject
GetPaletteEntries
SelectClipRgn
CreateCompatibleDC
PolyPolyline
CreateCompatibleBitmap
GetTextExtentPointW
CreateBitmapIndirect
GetNearestPaletteIndex
GetCharWidth32A
GetCharABCWidthsFloatA
SetROP2
RoundRect
GetPixel
CreateSolidBrush
GetRegionData
SelectPalette
MoveToEx
EndPage
SetLayout
Arc
GetTextExtentPoint32A
LineTo
GetMetaFileBitsEx
DeleteDC
GetDeviceCaps
StretchBlt
CopyEnhMetaFileA
ExcludeClipRect
CombineRgn
CreateBrushIndirect
Ellipse
ExtCreateRegion
GetObjectType
SetPaletteEntries
GetDIBColorTable
GetCharABCWidthsW
CreateRectRgn
GetTextExtentPointA
CreatePen
GetStockObject
TextOutA
CreatePalette
advapi32
SetSecurityDescriptorOwner
RegDeleteValueA
RegOpenKeyExA
InitializeSecurityDescriptor
EqualSid
CopySid
RegDeleteKeyA
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 718KB - Virtual size: 718KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fDTf Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ