Static task
static1
Behavioral task
behavioral1
Sample
2024-09-29_c2998c522a3ca8a4c7dccafd4ee14444_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-29_c2998c522a3ca8a4c7dccafd4ee14444_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-29_c2998c522a3ca8a4c7dccafd4ee14444_bkransomware
-
Size
6.6MB
-
MD5
c2998c522a3ca8a4c7dccafd4ee14444
-
SHA1
314a064b16827e7ac0610d30b4677b027dd79be1
-
SHA256
3e4acbc57d54bb34c8696be9cc5d3951523a23ed45382e48a6c57dcbfdd1d245
-
SHA512
d00f4983869a92ec745327d7317b1771f2ccd917f175440cbe4c733bea8f0c651dc9f0d1ea4db65bbe72e85c84aafaa70b3bbe02f2e4b7547102cbdf7ced8033
-
SSDEEP
196608:MZarAN0F2UNUfTU7ffJ/053unrRPiLtJ9wg6LP:Nj2UybinWdunrVi5Jq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-29_c2998c522a3ca8a4c7dccafd4ee14444_bkransomware
Files
-
2024-09-29_c2998c522a3ca8a4c7dccafd4ee14444_bkransomware.exe windows:6 windows x86 arch:x86
d1b697c604427120472eba7cec259976
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetStdHandle
GetCPInfo
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
VirtualFree
CreateTimerQueue
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
DeleteCriticalSection
EnterCriticalSection
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
WaitForSingleObject
DuplicateHandle
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetConsoleCP
CreateFileA
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateThread
ExpandEnvironmentStringsW
GetSystemTime
GetCurrentProcessId
CloseHandle
TlsAlloc
GetStringTypeW
GetOEMCP
CreateFileMappingA
GetLocalTime
ResetEvent
GlobalFree
SetLastError
GlobalUnlock
MultiByteToWideChar
GetACP
GetSystemDirectoryA
GetModuleFileNameW
CreateProcessA
MulDiv
Beep
LeaveCriticalSection
GetSystemTimeAdjustment
CreateEventA
Sleep
GetLocaleInfoW
SetCommState
GetWindowsDirectoryA
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
SetCommBreak
SetHandleInformation
GetModuleHandleExW
HeapFree
GetCommState
SetDllDirectoryW
LoadLibraryExW
FreeLibrary
SetEndOfFile
GlobalMemoryStatus
GetCommandLineW
ExitProcess
DeleteFileA
EnumSystemLocalesW
GetThreadTimes
FindNextFileA
GetModuleFileNameA
CreatePipe
GetFileType
IsValidCodePage
FlushFileBuffers
CompareStringW
GetOverlappedResult
GetCommandLineA
WaitForSingleObjectEx
ConnectNamedPipe
QueryPerformanceCounter
InitializeSListHead
GetCurrentProcess
VirtualQuery
UnmapViewOfFile
SetEvent
CreateFileW
user32
ShowOwnedPopups
ToAsciiEx
RegisterClassA
CheckMenuItem
EndPaint
ClientToScreen
DestroyWindow
SetCursor
GetSystemMenu
GetWindowRect
MapDialogRect
GetMessageW
TrackPopupMenu
IsIconic
SetKeyboardState
KillTimer
MsgWaitForMultipleObjects
DrawIconEx
LoadStringA
GetParent
RemovePropA
SetFocus
EnumWindows
DrawFocusRect
GetWindowTextA
SetPropA
GetKeyboardLayout
MessageBoxA
InvalidateRect
UnregisterClassA
SetScrollPos
PeekMessageA
EnableMenuItem
GetDlgItem
ScrollWindow
EndDialog
RedrawWindow
GetSysColor
CheckDlgButton
ShowWindow
CreatePopupMenu
DrawMenuBar
EnableScrollBar
IsWindow
RemoveMenu
FlashWindow
CreateWindowExW
ScrollWindowEx
RegisterClassW
SetCaretPos
SendMessageW
UpdateWindow
EnableWindow
SetScrollInfo
TranslateMDISysAccel
GetMessageA
HideCaret
CreateDialogParamA
SetCapture
LoadIconA
GetWindowInfo
GetClientRect
ShowCaret
BeginPaint
WaitMessage
GetDC
ShowCursor
GetWindowPlacement
SetRect
SetWindowLongA
DrawStateW
SetWindowsHookExA
DestroyCaret
GetDesktopWindow
SetMenu
IsDlgButtonChecked
AppendMenuA
PostMessageA
MessageBoxW
SystemParametersInfoA
ReleaseCapture
InsertMenuA
DestroyMenu
LoadCursorA
GetCaretBlinkTime
DrawFrameControl
gdi32
MoveToEx
BitBlt
GetWindowOrgEx
Arc
GetTextExtentPoint32A
LineTo
ExtFloodFill
GetCharacterPlacementW
CreateHatchBrush
Polygon
GetDeviceCaps
StretchBlt
CreateFontIndirectA
GetDIBits
SetBkColor
SetDIBColorTable
GdiFlush
GetRgnBox
SelectObject
GetPaletteEntries
PtInRegion
CreatePenIndirect
CreateRectRgnIndirect
CreateCompatibleBitmap
Rectangle
ExtCreateRegion
StretchDIBits
ExtCreatePen
SetPaletteEntries
GetObjectW
GetCharABCWidthsW
CreateRectRgn
GetCharWidth32A
GetCharABCWidthsFloatA
GetSystemPaletteEntries
CreatePatternBrush
CreatePen
IntersectClipRect
GetStockObject
SetWinMetaFileBits
CreateEnhMetaFileW
RestoreDC
UpdateColors
CreateSolidBrush
TextOutA
CreatePolygonRgn
EndPage
SetLayout
PatBlt
SetWindowExtEx
SetTextColor
DeleteDC
CreateFontA
CreateBitmap
PolyPolyline
CombineRgn
Ellipse
SetPolyFillMode
CreateBitmapIndirect
SelectPalette
SetStretchBltMode
SetViewportExtEx
SetTextAlign
CreateDIBitmap
EndDoc
ExtTextOutA
GetBitmapBits
GetBkColor
PlayEnhMetaFile
advapi32
RegOpenKeyExW
RegDeleteValueA
LookupPrivilegeValueW
SetSecurityDescriptorDacl
EqualSid
OpenProcessToken
GetUserNameA
SetSecurityDescriptorOwner
RegOpenKeyExA
RegDeleteKeyA
CopySid
RegCloseKey
AdjustTokenPrivileges
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 639KB - Virtual size: 639KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.AOLF Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ