Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_9c71bbe95a87b1ed03af5b9a85fabbe7_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_9c71bbe95a87b1ed03af5b9a85fabbe7_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_9c71bbe95a87b1ed03af5b9a85fabbe7_bkransomware
-
Size
600KB
-
MD5
9c71bbe95a87b1ed03af5b9a85fabbe7
-
SHA1
e793fb244afd27c6f02b19e9666bb0847d91a2bf
-
SHA256
b9d83da815088af884aabf4040e99ee357e1e2e1b3cc1afd783d3f16053c86c4
-
SHA512
db7a298161a442d8b3801bec4961e3584538cf3c472189fef45cf3e096ae6d9c7be017c216536ccc1bc0265211a4554ebee6cbcc368ece09401eeb3529c717ea
-
SSDEEP
12288:Ma2vwZV+O0VbqMjy/Ce0Jp3weDryuCPLSJ7o5UyDUoJoh1w:6oZA5Vbqey6LJZCPLco5nXog
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-05_9c71bbe95a87b1ed03af5b9a85fabbe7_bkransomware
Files
-
2024-10-05_9c71bbe95a87b1ed03af5b9a85fabbe7_bkransomware.exe windows:5 windows x86 arch:x86
585618d6558c5435cfab8a590056bdb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCBrushColor
GetTextCharsetInfo
GetNearestColor
GetPolyFillMode
GetTextColor
GetBkColor
GetSystemPaletteUse
GetDCPenColor
GetClipRgn
GetTextCharset
GetStretchBltMode
GetTextCharacterExtra
GetPixelFormat
GetDeviceCaps
GetMetaRgn
GetTextAlign
GetNearestPaletteIndex
GetFontLanguageInfo
GetMapMode
GetObjectType
GetRandomRgn
GetFontUnicodeRanges
SetSystemPaletteUse
user32
EndPaint
IsWindowUnicode
GetMenuCheckMarkDimensions
SetDlgItemTextA
RemovePropA
GetDialogBaseUnits
GetInputState
CheckDlgButton
GetMenu
GetQueueStatus
GetMenuContextHelpId
WindowFromDC
BeginPaint
LoadIconA
GetMenuItemCount
GetWindowLongA
GetPropA
EnableWindow
GetCursor
GetMenuItemID
GetDlgItem
PostMessageA
GetMenuState
GetWindowDC
GetWindowContextHelpId
IsWindowEnabled
SetWindowTextA
DrawTextA
SetFocus
GetForegroundWindow
MoveWindow
GetDC
EndDialog
SendMessageA
kernel32
SetEnvironmentVariableA
SetEndOfFile
SetEnvironmentVariableW
ReadConsoleW
ReadFile
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
QueryPerformanceCounter
GetModuleFileNameA
GetTimeZoneInformation
SetStdHandle
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeW
GetFileAttributesExW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
LoadResource
WriteFile
GlobalFlags
GlobalHandle
GetCurrentProcessId
GetTickCount
IsDebuggerPresent
MoveFileA
LocalFlags
GetStdHandle
DeleteFileA
GlobalSize
SizeofResource
GetLastError
GlobalAlloc
GetFileType
LockResource
GetCurrentProcess
IsProcessorFeaturePresent
GetVersion
GetFileTime
FindClose
SetFilePointer
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
DuplicateHandle
CreateProcessA
SetErrorMode
GetLocalTime
DeleteFileW
GetTempPathW
DeleteCriticalSection
Beep
Sleep
GetSystemTimeAsFileTime
GetTempPathA
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
RaiseException
GetCurrentThread
WaitForSingleObject
GetExitCodeProcess
CreatePipe
GetFullPathNameA
Sections
.text Size: 522KB - Virtual size: 522KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE