Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_e40a23c70027a430f5bfc33bce6e82f5_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_e40a23c70027a430f5bfc33bce6e82f5_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_e40a23c70027a430f5bfc33bce6e82f5_bkransomware
-
Size
6.6MB
-
MD5
e40a23c70027a430f5bfc33bce6e82f5
-
SHA1
ee27646c5a5867f2b6d66a704cb0338c1e7a99d2
-
SHA256
559892f19412ddd5ee31b3d6fc0286420c198e09d409c5f6aa01c42dc3da38c3
-
SHA512
c2f0eb3fb6ff213f71a1703f942d3794c9491535096c56f60811e2490eaa8046fb5616a90509c03bd9b1cecc5f629049979f8ee208a433ba40794c2956145b35
-
SSDEEP
98304:VtKjWoyofcc2jLME4YuHQQrka+nm9fklq3i7h6N7F4QKYlZziqbO1Ybiy:Vt0A5DvMEtuZFfks3i7kFOYDZbL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-01_e40a23c70027a430f5bfc33bce6e82f5_bkransomware
Files
-
2024-10-01_e40a23c70027a430f5bfc33bce6e82f5_bkransomware.exe windows:6 windows x86 arch:x86
2050a06a994ee854cc44a6c5cdaa9fb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetStdHandle
GetOEMCP
GetACP
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcess
DuplicateHandle
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
GetDateFormatW
SetStdHandle
CreateThread
ExpandEnvironmentStringsW
TlsFree
GetSystemTime
LocalFree
OpenFileMappingA
CloseHandle
DeleteCriticalSection
FindNextFileA
GetModuleFileNameA
CreateEventW
CreateFileMappingA
GetLocalTime
IsValidCodePage
RaiseException
FlushFileBuffers
GlobalUnlock
TerminateProcess
MulDiv
Beep
LeaveCriticalSection
GetFileAttributesA
GetSystemTimeAdjustment
GetLocaleInfoW
IsValidLocale
SetCommTimeouts
GetCommandLineA
ClearCommBreak
ExpandEnvironmentStringsA
GetCurrentThread
SetCommBreak
WaitForSingleObject
GlobalLock
SetHandleInformation
HeapFree
QueryPerformanceCounter
FreeLibrary
GetCPInfo
UnmapViewOfFile
TlsGetValue
GlobalMemoryStatus
CreateFileA
GetCommandLineW
ExitProcess
EnterCriticalSection
DeleteFileA
EnumSystemLocalesW
FindNextFileW
GetModuleHandleA
GetFileType
LoadLibraryA
IsDBCSLeadByteEx
CompareStringW
CreateFileW
GetTimeZoneInformation
GetModuleFileNameW
CreateProcessA
IsProcessorFeaturePresent
Sleep
TlsSetValue
SetCommState
ConnectNamedPipe
GetModuleHandleExW
GetEnvironmentStringsW
SetEndOfFile
MapViewOfFile
GetThreadPriority
WriteConsoleW
user32
GetMessageA
EndPaint
MapDialogRect
CreateDialogParamA
GetMessageW
ToAsciiEx
GetSystemMenu
DestroyWindow
IsRectEmpty
CheckMenuItem
SendDlgItemMessageA
IsIconic
SetKeyboardState
KillTimer
MsgWaitForMultipleObjects
LoadStringA
RemovePropA
MessageBeep
CreateMenu
ShowCaret
BeginPaint
SetScrollRange
CreateIconIndirect
GetCapture
DrawFocusRect
CreateDialogIndirectParamA
OffsetRect
GetWindowTextA
GetKeyboardLayout
SetRect
GetScrollInfo
MessageBoxA
UnionRect
InvalidateRect
UnregisterClassA
SystemParametersInfoW
SetScrollPos
PeekMessageA
ReleaseDC
EnableMenuItem
GetDlgItem
RedrawWindow
DestroyCursor
ShowWindow
SetMenu
CreatePopupMenu
AppendMenuA
CreateCaret
RemoveMenu
CreateWindowExW
SystemParametersInfoA
ReleaseCapture
SetCaretPos
InsertMenuA
SetWindowTextA
SendMessageW
UpdateWindow
LoadCursorA
GetDlgItemTextA
DialogBoxParamA
DestroyIcon
DrawFrameControl
TranslateMDISysAccel
CopyRect
GetMessageTime
TrackPopupMenu
EnumWindows
EnableScrollBar
SetCursor
DestroyAcceleratorTable
LoadIconA
SetParent
SetFocus
GetWindowTextLengthA
GetDoubleClickTime
GetDC
ShowCursor
GetWindowPlacement
SetPropA
SetWindowLongA
SetClassLongA
ScrollWindow
EndDialog
DefWindowProcA
GetDesktopWindow
GetSysColor
PostMessageA
ScrollWindowEx
gdi32
CreateHatchBrush
Polygon
CreateFontA
GetDeviceCaps
StretchBlt
ExcludeClipRect
GdiFlush
CreateHalftonePalette
CreatePalette
CreateBitmap
GetRegionData
GetPaletteEntries
CreatePenIndirect
CreateCompatibleDC
PolyPolyline
Rectangle
CreateBrushIndirect
Ellipse
ExtCreateRegion
SetPolyFillMode
StretchDIBits
GetTextExtentPointW
GetBkColor
CreateBitmapIndirect
SelectPalette
SetPaletteEntries
GetObjectW
GetCharABCWidthsW
GetTextExtentPointA
Polyline
GetClipBox
GetMetaFileBitsEx
SetTextAlign
IntersectClipRect
GetPixel
GetStockObject
SetWinMetaFileBits
CloseEnhMetaFile
RestoreDC
UpdateColors
TextOutA
DeleteDC
RectInRegion
ExtTextOutA
EndPage
GetWindowOrgEx
Arc
SetViewportOrgEx
SetTextColor
CreateFontIndirectA
SetBkColor
SetDIBColorTable
CopyEnhMetaFileA
GetRgnBox
CreateRectRgnIndirect
PlayEnhMetaFile
SetMapMode
RealizePalette
GetNearestPaletteIndex
GetSystemPaletteEntries
CreatePatternBrush
SetROP2
RoundRect
EndDoc
CreateEnhMetaFileW
SetWindowExtEx
GetTextExtentPoint32A
PatBlt
SetLayout
PolyPolygon
SetWindowOrgEx
MoveToEx
SetViewportExtEx
SetStretchBltMode
advapi32
RegDeleteKeyA
RegQueryValueExW
AdjustTokenPrivileges
RegOpenKeyExW
SetSecurityDescriptorOwner
RegDeleteValueA
SetSecurityDescriptorDacl
OpenProcessToken
GetLengthSid
RegOpenKeyExA
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 645KB - Virtual size: 645KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CzBLM Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ