Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_6bdeef332a861ecb035dbc572fec92df_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-30_6bdeef332a861ecb035dbc572fec92df_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-30_6bdeef332a861ecb035dbc572fec92df_bkransomware
-
Size
505KB
-
MD5
6bdeef332a861ecb035dbc572fec92df
-
SHA1
f452f3fd53db5dc733017df99406e94c2d9e1b03
-
SHA256
2a99cc2891b50411692fdad99b393a42e941831cfbf36f306633076afb6a38ad
-
SHA512
1cf0ad9e709040e5377b015cff3b5e0826e198df61d32b0525a82a82c34b9c9e46eaae78ac0aa73efa1b3532c5dfe43c2da5be56ab4835232ce3572021c834e8
-
SSDEEP
12288:4XqGjySCKfnAHIQuOtpv8fQwAApwLAcYA59iUF:4XqGjyEfnAHs8d0QTgwl159
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-30_6bdeef332a861ecb035dbc572fec92df_bkransomware
Files
-
2024-09-30_6bdeef332a861ecb035dbc572fec92df_bkransomware.exe windows:5 windows x86 arch:x86
da6ac4c4659c9cd32d7a0ed44744115d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetNearestColor
GetBkColor
GetTextCharsetInfo
GetMetaRgn
GetFontUnicodeRanges
GetDCBrushColor
GetTextCharset
GetDeviceCaps
GetFontLanguageInfo
SetTextColor
GetCurrentObject
GetNearestPaletteIndex
GetObjectType
SetSystemPaletteUse
SetTextCharacterExtra
GetDCPenColor
SetTextAlign
GetRandomRgn
GetTextAlign
GetPixelFormat
GetPolyFillMode
user32
EndDialog
SetDlgItemTextA
PostMessageA
CheckDlgButton
SetFocus
LoadIconA
GetInputState
WindowFromDC
GetMenuState
GetDlgItemInt
SendMessageA
GetMenuItemCount
IsWindowEnabled
GetDialogBaseUnits
GetWindowDC
GetWindowLongA
GetCursor
GetWindowContextHelpId
GetMenuCheckMarkDimensions
ShowWindow
EndPaint
GetMenuItemID
GetKeyboardType
GetScrollPos
GetQueueStatus
GetForegroundWindow
DrawTextA
GetDlgItem
GetDC
EnableWindow
GetPropA
GetMenuContextHelpId
SetWindowTextA
BeginPaint
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetCPInfo
GetOEMCP
GetProcAddress
GetTickCount
GetModuleHandleA
GetProcessHeap
GetVersion
SetFilePointer
DeleteFileA
GlobalSize
GlobalFlags
GetLastError
CloseHandle
MoveFileA
GetFileTime
IsDebuggerPresent
WriteFile
GetCurrentThreadId
GlobalAlloc
SizeofResource
GetCurrentProcess
IsProcessorFeaturePresent
FindClose
FlushFileBuffers
LockResource
GlobalHandle
LocalFlags
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
SetLastError
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
SetEnvironmentVariableA
Sections
.text Size: 455KB - Virtual size: 455KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE