Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_c460cc999ec0f7577835059269efd048_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_c460cc999ec0f7577835059269efd048_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_c460cc999ec0f7577835059269efd048_bkransomware
-
Size
6.7MB
-
MD5
c460cc999ec0f7577835059269efd048
-
SHA1
0aab81c127a9d08323a3434181d2fc223a627375
-
SHA256
916cf80f8637f7105177841b45c49118155993239833896ba5de120c3f09ac69
-
SHA512
f8f9ec6b06b8031cb2901e67570a5d447b1b4d9c71583aaaf9bf6c009b08a98682c560cee40a1108e107d792c0553a7718ae959290ea71d1d9b7750a91f95853
-
SSDEEP
196608:PDOW8WN9M7ERfe+Xh/IfT9x0Ugl3UZ7wU8P/SjVNJGgJh:7OOCchq30UUE38XSBND
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-01_c460cc999ec0f7577835059269efd048_bkransomware
Files
-
2024-10-01_c460cc999ec0f7577835059269efd048_bkransomware.exe windows:6 windows x86 arch:x86
35e762f6ddc5009f274971712535f754
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadTimes
LocalFree
EnumSystemLocalesW
ExpandEnvironmentStringsW
SetStdHandle
LoadLibraryW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetStdHandle
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
GetSystemDirectoryA
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
CloseHandle
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsAlloc
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
DeleteCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
DuplicateHandle
Sleep
TlsSetValue
GetProcessTimes
ClearCommBreak
GetWindowsDirectoryA
WriteConsoleW
ExpandEnvironmentStringsA
GetTickCount
ConnectNamedPipe
SetHandleInformation
WaitNamedPipeA
GetStringTypeW
FindNextFileW
IsValidCodePage
SetLastError
IsDBCSLeadByteEx
RaiseException
GlobalUnlock
MultiByteToWideChar
CompareStringW
CreateFileW
GetTimeZoneInformation
GetModuleFileNameW
TerminateProcess
CreateProcessA
MulDiv
LeaveCriticalSection
GetFileAttributesA
GetSystemTimeAdjustment
InitializeCriticalSectionAndSpinCount
IsValidLocale
WideCharToMultiByte
OpenProcess
SetCommTimeouts
GetCommandLineA
SetCommState
WaitForSingleObject
GetModuleHandleExW
InitializeSListHead
GetCurrentProcess
SetDllDirectoryW
SetEndOfFile
UnmapViewOfFile
GetLocaleInfoA
TlsGetValue
CreateFileA
GetCommandLineW
ExitProcess
QueryPerformanceCounter
LoadLibraryExW
CreateThread
TlsFree
GetModuleHandleA
FindNextFileA
GetOEMCP
CreatePipe
GetFileType
CreateFileMappingA
GetLocalTime
GlobalFree
EnterCriticalSection
CreateNamedPipeA
GetACP
GetNumaHighestNodeNumber
GetOverlappedResult
FreeLibrary
GetCPInfo
user32
SetWindowRgn
HideCaret
CreateDialogParamA
EndPaint
IsIconic
SetCapture
KillTimer
IsZoomed
SendDlgItemMessageA
GetWindowThreadProcessId
TranslateMDISysAccel
LoadStringA
MessageBeep
SetParent
SetFocus
GetWindowTextLengthA
DrawEdge
ShowCaret
BeginPaint
EnumWindows
GetQueueStatus
GetCapture
GetWindowPlacement
SetRect
CheckMenuRadioItem
SetWindowLongA
GetScrollInfo
MessageBoxA
UnregisterClassA
DrawStateW
ScrollWindow
RedrawWindow
DestroyCursor
DestroyCaret
CheckDlgButton
ShowWindow
CreatePopupMenu
IsDlgButtonChecked
EnableScrollBar
CreateWindowExW
MessageBoxW
ScrollWindowEx
BeginDeferWindowPos
RegisterClassW
GetSystemMetrics
InsertMenuA
ValidateRgn
SendMessageW
UpdateWindow
EndMenu
DestroyMenu
LoadCursorA
DialogBoxParamA
SetDlgItemTextA
SetScrollInfo
IsRectEmpty
ToAsciiEx
ShowOwnedPopups
ClientToScreen
GetMessageA
DestroyAcceleratorTable
GetSystemMenu
SetTimer
MapDialogRect
PostQuitMessage
SetKeyboardState
MsgWaitForMultipleObjects
GetClientRect
GetDoubleClickTime
WaitMessage
GetDC
CreateDialogIndirectParamA
OffsetRect
GetWindowTextA
InvalidateRect
SystemParametersInfoW
SetScrollPos
ReleaseDC
GetDlgItem
DefWindowProcA
GetDesktopWindow
AppendMenuA
GetDlgItemTextA
ToUnicode
DrawFrameControl
CheckMenuItem
GetMessageW
gdi32
CreatePolygonRgn
MoveToEx
TranslateCharsetInfo
LineTo
GetCharacterPlacementW
Polygon
GetDeviceCaps
StretchBlt
SetDIBColorTable
GdiFlush
GetRegionData
SelectObject
SelectClipRgn
CreateCompatibleDC
SetMapMode
SaveDC
SetPolyFillMode
GetObjectType
CreateBitmapIndirect
SetPaletteEntries
GetDIBColorTable
GetObjectW
GetTextExtentExPointA
CreateRectRgn
GetCharWidth32A
GetTextExtentPointA
CreatePatternBrush
Polyline
SetViewportExtEx
SetROP2
RectVisible
RoundRect
SetTextAlign
IntersectClipRect
CreateDIBitmap
EndDoc
SetWinMetaFileBits
Arc
SetTextColor
CreateHatchBrush
ExcludeClipRect
CreateHalftonePalette
CreatePalette
CreateBitmap
PlayEnhMetaFile
CombineRgn
CreateCompatibleBitmap
OffsetRgn
ExtCreateRegion
GetPixel
GetStockObject
TextOutA
GetBitmapBits
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
OpenProcessToken
EqualSid
SetSecurityDescriptorDacl
RegDeleteValueA
SetSecurityDescriptorOwner
RegOpenKeyExW
GetUserNameA
GetLengthSid
LookupPrivilegeValueW
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 689KB - Virtual size: 689KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lpt Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ