Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_1336c3741ef8fd91f5607ea6ce120210_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_1336c3741ef8fd91f5607ea6ce120210_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_1336c3741ef8fd91f5607ea6ce120210_bkransomware
-
Size
6.7MB
-
MD5
1336c3741ef8fd91f5607ea6ce120210
-
SHA1
97ca711904c2b7752a7105cb6e7a1e6cc86e0069
-
SHA256
86e733049c27460d02343648a184c12d89af2227a958195676cd9cc26fb796e6
-
SHA512
58ba7b679da96799ef87d87903ae63a704306132060e1638112b139c2af71e70684de8ab1ac53cfc032a75d1573e4439742503d66c7ce3cd27229d16547c81a1
-
SSDEEP
196608:1UAgNQBUSXxgAT05ebIrL4PF8FvzF5FzqD+oR:1UAyqfXxg1U8LsI5cD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-01_1336c3741ef8fd91f5607ea6ce120210_bkransomware
Files
-
2024-10-01_1336c3741ef8fd91f5607ea6ce120210_bkransomware.exe windows:6 windows x86 arch:x86
2ea9dfe3ae7a891d1048a11a0d4ad68e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetThreadPriority
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
LoadLibraryW
SetStdHandle
WriteConsoleW
SwitchToThread
ResumeThread
WinExec
IsDebuggerPresent
RemoveDirectoryW
GetCPInfoExW
GetExitCodeProcess
HeapCreate
GetVersionExW
ReadProcessMemory
SizeofResource
Sleep
VirtualQueryEx
GetPrivateProfileStringW
CompareFileTime
LoadResource
FindResourceW
FindFirstFileW
GetDriveTypeW
GetTempFileNameW
EncodePointer
GetFullPathNameW
CreateDirectoryW
lstrcpyW
GetVersion
GetWindowsDirectoryW
GetThreadPriority
EnumResourceTypesW
LockResource
GetExitCodeThread
GetDiskFreeSpaceW
VirtualAlloc
GetThreadLocale
SetThreadLocale
VerifyVersionInfoW
GetPrivateProfileIntW
GetTempPathW
WritePrivateProfileStringW
ExitThread
FormatMessageW
GetSystemDefaultUILanguage
RtlCaptureContext
SetFilePointer
GetStdHandle
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
CreateFileW
user32
ToAsciiEx
ShowOwnedPopups
GetMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
MsgWaitForMultipleObjects
GetSubMenu
LoadIconA
MessageBeep
GetMenuStringW
CharLowerBuffW
SetScrollRange
ShowCursor
MessageBoxA
UnregisterClassA
GetWindowLongA
SetScrollPos
EnableMenuItem
MonitorFromWindow
SetClassLongA
CharUpperW
SetWindowLongW
SendDlgItemMessageW
GetSysColor
ShowWindow
GetSysColorBrush
AppendMenuA
IsWindow
PostMessageA
CreateWindowExW
CheckRadioButton
GetKeyboardLayout
SendMessageW
UpdateWindow
DialogBoxParamA
GetMonitorInfoW
TranslateMDISysAccel
DestroyWindow
GetMessageA
SetWindowRgn
GetSystemMenu
MapDialogRect
SendDlgItemMessageA
CharNextW
IsIconic
SetCapture
PostMessageW
GetParent
SetParent
GetClientRect
SetFocus
DrawEdge
BeginPaint
GetDC
GetQueueStatus
SetDlgItemInt
OffsetRect
SetRect
GetScrollInfo
GetWindowLongW
GetWindowTextW
PeekMessageA
ScrollWindow
EndDialog
SetWindowsHookExA
DestroyCaret
GetDesktopWindow
GetMenuItemCount
RemoveMenu
InsertMenuW
ReleaseCapture
SetDlgItemTextW
GetDlgCtrlID
GetCaretBlinkTime
SetScrollInfo
ValidateRect
SetWindowTextA
gdi32
GetBitmapBits
BitBlt
LineTo
MaskBlt
GetCharacterPlacementW
SetDIBColorTable
CopyEnhMetaFileA
SetMapMode
SelectPalette
CreateRectRgn
GetCharABCWidthsFloatA
Polyline
SetTextAlign
CreateDIBitmap
GetPixel
ExtTextOutA
RestoreDC
CreateCompatibleBitmap
EndPage
PatBlt
SetTextColor
CreateFontIndirectA
GetDIBits
ExcludeClipRect
CreateHalftonePalette
GetPaletteEntries
CreatePenIndirect
CreateCompatibleDC
CreateRectRgnIndirect
GetCurrentPositionEx
SetPaletteEntries
CreatePen
TextOutA
RoundRect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegLoadKeyW
RegConnectRegistryW
QueryServiceStatus
StartServiceW
InitializeSecurityDescriptor
ControlService
GetLengthSid
CopySid
CloseServiceHandle
shell32
ExtractIconExW
ShellExecuteExW
CommandLineToArgvW
SHGetFileInfoW
Shell_NotifyIconW
oleaut32
SysFreeString
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
Sections
.text Size: 677KB - Virtual size: 676KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vWPtJ Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ