Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_d193267a6b54be13f58d099c9267a775_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-03_d193267a6b54be13f58d099c9267a775_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_d193267a6b54be13f58d099c9267a775_bkransomware
-
Size
6.7MB
-
MD5
d193267a6b54be13f58d099c9267a775
-
SHA1
642b961516da6c6e75c29d100518d754e3ccb1e1
-
SHA256
4bc5617f8e3e12afea2de4f3041d19fd039e1a17775b4aaf417131daee0bf7c0
-
SHA512
7f0deb2708ef6429e7c03503625eb73e7c9f303ef83326408d08fe7ee2203e32e39f4153cccaa77780fa4436d22a11ae47bd8cacd1e51f9176917e0aa4d0a812
-
SSDEEP
98304:/JV/VExoHvrMqBbp5OYYWq7LQ5vyXU39MaDkhP+MKQM0ocdBqWGKeGu8rNqMuc1V:/JV/VTHvlj4YK/NE39zDkhrKnnU5b7V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-03_d193267a6b54be13f58d099c9267a775_bkransomware
Files
-
2024-10-03_d193267a6b54be13f58d099c9267a775_bkransomware.exe windows:6 windows x86 arch:x86
5fb213868ea2b9cbae72421088495459
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
QueryDepthSList
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetThreadPriority
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
SwitchToThread
GetExitCodeThread
GetCPInfoExW
VerifyVersionInfoW
GetFullPathNameW
GetPrivateProfileIntW
GetTempPathW
ExitThread
FileTimeToSystemTime
FormatMessageW
ReadProcessMemory
Sleep
GetSystemDirectoryW
EnumCalendarInfoW
GetDriveTypeW
FindFirstFileW
GetFileSize
GetTempFileNameW
VirtualAlloc
GetLogicalDrives
ResumeThread
GetVersion
IsDebuggerPresent
GetThreadPriority
GetDiskFreeSpaceW
GetLastError
WritePrivateProfileStringW
HeapCreate
SizeofResource
GetUserDefaultLangID
VirtualQueryEx
GetUserDefaultLCID
CompareFileTime
VerSetConditionMask
FindResourceW
SetErrorMode
EnumResourceNamesW
RegisterWaitForSingleObject
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
CloseHandle
CreateFileW
user32
IsWindow
EndPaint
DestroyWindow
SetCursor
GetMessageA
SetWindowRgn
GetSystemMenu
SetTimer
HideCaret
GetWindowRect
GetMessageW
PostQuitMessage
TrackPopupMenu
IsIconic
SetCapture
GetKeyState
GetSubMenu
LoadIconA
GetClientRect
CreateMenu
DrawTextExW
DrawEdge
GetMenuItemInfoW
ShowCaret
SetDlgItemInt
GetWindowPlacement
SetWindowLongA
GetScrollInfo
MessageBoxA
UnionRect
InvalidateRect
LoadMenuW
GetWindowLongA
GetWindowTextW
PeekMessageA
GetDlgItem
RedrawWindow
DestroyCaret
SendDlgItemMessageW
GetSysColor
GetWindow
SetMenu
AppendMenuA
GetMenuItemCount
ShowWindow
PostMessageA
FlashWindow
CreateWindowExW
SystemParametersInfoA
ReleaseCapture
RegisterClassW
SetWindowTextA
GetDlgItemTextW
SetDlgItemTextW
SendMessageW
UpdateWindow
EnableWindow
GetDlgCtrlID
GetCaretBlinkTime
SetWindowTextW
SetScrollInfo
CheckDlgButton
GetKeyboardType
ToAsciiEx
RegisterWindowMessageW
SetKeyboardState
PostMessageW
KillTimer
MsgWaitForMultipleObjects
AttachThreadInput
MessageBeep
ModifyMenuW
GetDC
GetQueueStatus
GetCapture
GetMenu
SetPropA
SetRect
UnregisterClassA
GetClassNameW
ReleaseDC
SetClassLongA
DefWindowProcA
GetDesktopWindow
EnumChildWindows
GetSysColorBrush
GetSystemMetrics
SetMenuItemInfoW
ValidateRect
CheckMenuItem
TranslateMDISysAccel
GetMessageTime
gdi32
MoveToEx
EndPage
GetTextExtentPoint32W
PatBlt
LineTo
SetTextColor
MaskBlt
CreateFontIndirectW
SetDIBColorTable
ExcludeClipRect
CreatePalette
CreateBitmap
GetPaletteEntries
CreateCompatibleDC
RealizePalette
GetObjectType
SelectPalette
GetClipBox
CreateDIBitmap
ExtTextOutA
CreateCompatibleBitmap
BitBlt
DeleteDC
CreateFontA
GetDIBits
DeleteObject
CreatePenIndirect
CreateRectRgnIndirect
Rectangle
GetCharABCWidthsFloatA
Polyline
RoundRect
SetTextAlign
GetPixel
GetStockObject
TextOutA
SetMapMode
comdlg32
FindTextW
GetSaveFileNameW
advapi32
RegEnumKeyExW
GetLengthSid
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
InitializeSecurityDescriptor
OpenServiceW
OpenSCManagerW
RegUnLoadKeyW
RegSetValueExW
GetUserNameA
AllocateAndInitializeSid
RegQueryInfoKeyW
CloseServiceHandle
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetFileInfoW
ole32
CoInitialize
oleaut32
SafeArrayPtrOfIndex
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysReAllocStringLen
SysFreeString
Sections
.text Size: 710KB - Virtual size: 710KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LUR Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ