Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_0a8ba62df9ee01619557832a0f1fa83a_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_0a8ba62df9ee01619557832a0f1fa83a_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_0a8ba62df9ee01619557832a0f1fa83a_bkransomware
-
Size
6.6MB
-
MD5
0a8ba62df9ee01619557832a0f1fa83a
-
SHA1
c9eb5c6c04bb31816e7924716802054eb8189b02
-
SHA256
365fb6c1080e396402604339208f394b4e33380fd6f660fcc7fcd1f068d5aa9e
-
SHA512
95a6def9e85345fea8b838aa194e4dbd88f03d79ac15ef63935693f2dcc7143dff185eeebd6172047ce8838fa80aef7725fdf457477718e9399d484b0918ecdd
-
SSDEEP
196608:sd52IfGW+yv8hHA/aoqon81/r3mQNeZUr3oPW:sWXNOyH+YTwUr3m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-02_0a8ba62df9ee01619557832a0f1fa83a_bkransomware
Files
-
2024-10-02_0a8ba62df9ee01619557832a0f1fa83a_bkransomware.exe windows:6 windows x86 arch:x86
55076b90f5d34b656be11cbe0d35b8a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetFileType
GetStdHandle
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
UnregisterWaitEx
GetModuleHandleExW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
ExitThread
LCMapStringW
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
OpenFileMappingA
DeleteCriticalSection
GetOEMCP
GetModuleFileNameA
GetLocalTime
GetACP
GetCommandLineW
IsProcessorFeaturePresent
Sleep
WideCharToMultiByte
TlsSetValue
GetProcessTimes
SetCommTimeouts
GetWindowsDirectoryA
GetCurrentThread
GetTickCount
GetCPInfo
CreateFileA
ExitProcess
GetLocaleInfoW
GlobalMemoryStatus
GetSystemTime
GetThreadTimes
CreateFileMappingA
IsValidCodePage
CreateNamedPipeA
RaiseException
FlushFileBuffers
GetOverlappedResult
GetModuleFileNameW
TerminateProcess
MulDiv
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
ConnectNamedPipe
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeSListHead
GetCurrentProcess
FreeLibrary
UnmapViewOfFile
MapViewOfFile
MultiByteToWideChar
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsFree
GetStartupInfoW
CreateFileW
user32
RegisterClassA
ShowOwnedPopups
DestroyAcceleratorTable
SetWindowRgn
HideCaret
GetMessageW
PostQuitMessage
TrackPopupMenu
KillTimer
CreateMenu
GetDoubleClickTime
ShowCursor
InflateRect
SetPropA
SetRect
CheckMenuRadioItem
MessageBoxA
UnionRect
SystemParametersInfoW
SetScrollPos
SetClassLongA
DrawStateW
DefWindowProcA
SetWindowsHookExA
DestroyCaret
CheckDlgButton
ShowWindow
FlashWindow
CreateWindowExW
SetCaretPos
InsertMenuA
SendMessageW
UpdateWindow
ToUnicode
DestroyIcon
CheckMenuItem
GetWindowPlacement
GetKeyboardLayout
ClientToScreen
DestroyWindow
SetTimer
MsgWaitForMultipleObjects
IsZoomed
SetParent
GetWindowTextLengthA
DrawEdge
BeginPaint
EnumWindows
SetScrollRange
GetDC
GetScrollInfo
UnregisterClassA
GetWindowLongA
ReleaseDC
EnableMenuItem
RedrawWindow
GetDesktopWindow
GetSysColor
EnableScrollBar
AppendMenuA
SetWindowTextA
EndMenu
LoadCursorA
gdi32
PolyPolygon
Arc
GetTextExtentPoint32A
SetViewportOrgEx
ExtFloodFill
MaskBlt
DeleteDC
Polygon
CreateFontA
SetBkColor
GetRegionData
CreatePenIndirect
CreateRectRgnIndirect
Rectangle
RealizePalette
GetObjectType
GetBkColor
CreateBitmapIndirect
GetCurrentPositionEx
GetObjectW
GetCharABCWidthsFloatA
SetWinMetaFileBits
ExtCreatePen
SetWindowOrgEx
SetLayout
BitBlt
LineTo
SetTextColor
GetDIBits
CreateHalftonePalette
GetEnhMetaFileHeader
SelectObject
PlayEnhMetaFile
RectInRegion
StretchDIBits
SetStretchBltMode
CreateRectRgn
GetSystemPaletteEntries
CreatePatternBrush
Polyline
GetClipBox
RoundRect
SetTextAlign
IntersectClipRect
CreateEnhMetaFileW
RestoreDC
CreateSolidBrush
TextOutA
GetWindowOrgEx
advapi32
GetLengthSid
AllocateAndInitializeSid
RegDeleteValueA
SetSecurityDescriptorDacl
RegDeleteKeyA
CopySid
OpenProcessToken
GetUserNameA
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 658KB - Virtual size: 658KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TURz Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ