Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_2ea4e5b38100cbcfa30f58b6ee223918_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-30_2ea4e5b38100cbcfa30f58b6ee223918_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-30_2ea4e5b38100cbcfa30f58b6ee223918_bkransomware
-
Size
536KB
-
MD5
2ea4e5b38100cbcfa30f58b6ee223918
-
SHA1
e9e13873a0606146a51faa04ca88d5c8f0bc5780
-
SHA256
b7b78a7e73c54a895cba7dd7f188dd6d662019b2addce3c0d147fced1cf722d3
-
SHA512
0eb8f37823bb421514dc1a247513da588d8d6f7d56fd0d82947872f3f74412fd8caa4fb4da4674b82aa7364fe14302d556734da86995e1aad8326f2f03a6b249
-
SSDEEP
12288:N1Y9RnTnX42XnVRWglko5OUMOwzMa1d64LGzUz:8jnTX4IVRWQko5jMOEMa+47
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-30_2ea4e5b38100cbcfa30f58b6ee223918_bkransomware
Files
-
2024-09-30_2ea4e5b38100cbcfa30f58b6ee223918_bkransomware.exe windows:5 windows x86 arch:x86
a6b118aece9926e5431575d052abddcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetRandomRgn
GetTextColor
GetPixelFormat
SetSystemPaletteUse
GetDCBrushColor
GetSystemPaletteUse
GetBkColor
GetNearestColor
GetClipRgn
GetObjectType
GetDCPenColor
GetTextCharacterExtra
GetTextAlign
GetMetaRgn
GetCurrentObject
SetTextColor
GetPolyFillMode
GetFontLanguageInfo
SetTextAlign
GetFontUnicodeRanges
GetDeviceCaps
GetGraphicsMode
SetTextJustification
GetMapMode
GetNearestPaletteIndex
SetTextCharacterExtra
user32
GetKeyboardType
GetDlgItemInt
MoveWindow
SetFocus
GetMenuState
CallWindowProcA
LoadIconA
CheckDlgButton
GetDialogBaseUnits
SendMessageA
GetForegroundWindow
SetDlgItemTextA
PostMessageA
GetQueueStatus
EnableWindow
GetCursor
EndPaint
IsWindowEnabled
WindowFromDC
GetMenuContextHelpId
DrawTextA
GetWindowDC
SetWindowTextA
RemovePropA
GetWindowLongA
GetWindowContextHelpId
EndDialog
GetDlgItem
GetMenuItemCount
ShowWindow
GetScrollPos
GetPropA
GetInputState
kernel32
SetEndOfFile
SetEnvironmentVariableA
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
CreateFileW
GetFileAttributesExW
GetCurrentDirectoryW
SetCurrentDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
MoveFileExW
SetStdHandle
ReadConsoleW
ReadFile
GetTimeZoneInformation
GetProcAddress
DeleteFileA
FindResourceA
GetCurrentThreadId
IsProcessorFeaturePresent
FindClose
FlushFileBuffers
GetCurrentProcessId
IsDebuggerPresent
LocalFlags
LoadResource
GetProcessHeap
GetModuleHandleA
GetLastError
WriteFile
SetFilePointer
GlobalHandle
GetFileType
GetVersion
GetTickCount
GetFileTime
MoveFileA
GetCurrentProcess
GlobalSize
GetDriveTypeA
SizeofResource
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
DeleteCriticalSection
GetFullPathNameW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
SetLastError
GetCurrentThread
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
DeleteFileW
GetFullPathNameA
RaiseException
Sections
.text Size: 479KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE