Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_6d729f271aa84002c7470c0313235a0b_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_6d729f271aa84002c7470c0313235a0b_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_6d729f271aa84002c7470c0313235a0b_bkransomware
-
Size
6.7MB
-
MD5
6d729f271aa84002c7470c0313235a0b
-
SHA1
83dbde8a675b3ea69f9bfeadd1a59875c8fc7a7a
-
SHA256
f1559997305ae0959180721bb8d028db90d7f1602b17e18fa75a47c467329dfc
-
SHA512
50403bbe90f27d1b611a43f17ecee4aa27e5264c9cb24e8219207a9c19f4e9c97915624e5263a156a558c85c731e1fab4e2708d61cb310e7c48c059dd38b2883
-
SSDEEP
196608:4UAgNQBUSXxgAT05ebIrL4PF8FvzF5FzqD+oR:4UAyqfXxg1U8LsI5cD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-05_6d729f271aa84002c7470c0313235a0b_bkransomware
Files
-
2024-10-05_6d729f271aa84002c7470c0313235a0b_bkransomware.exe windows:6 windows x86 arch:x86
2ea9dfe3ae7a891d1048a11a0d4ad68e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetThreadPriority
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
LoadLibraryW
SetStdHandle
WriteConsoleW
SwitchToThread
ResumeThread
WinExec
IsDebuggerPresent
RemoveDirectoryW
GetCPInfoExW
GetExitCodeProcess
HeapCreate
GetVersionExW
ReadProcessMemory
SizeofResource
Sleep
VirtualQueryEx
GetPrivateProfileStringW
CompareFileTime
LoadResource
FindResourceW
FindFirstFileW
GetDriveTypeW
GetTempFileNameW
EncodePointer
GetFullPathNameW
CreateDirectoryW
lstrcpyW
GetVersion
GetWindowsDirectoryW
GetThreadPriority
EnumResourceTypesW
LockResource
GetExitCodeThread
GetDiskFreeSpaceW
VirtualAlloc
GetThreadLocale
SetThreadLocale
VerifyVersionInfoW
GetPrivateProfileIntW
GetTempPathW
WritePrivateProfileStringW
ExitThread
FormatMessageW
GetSystemDefaultUILanguage
RtlCaptureContext
SetFilePointer
GetStdHandle
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
CreateFileW
user32
ToAsciiEx
ShowOwnedPopups
GetMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
MsgWaitForMultipleObjects
GetSubMenu
LoadIconA
MessageBeep
GetMenuStringW
CharLowerBuffW
SetScrollRange
ShowCursor
MessageBoxA
UnregisterClassA
GetWindowLongA
SetScrollPos
EnableMenuItem
MonitorFromWindow
SetClassLongA
CharUpperW
SetWindowLongW
SendDlgItemMessageW
GetSysColor
ShowWindow
GetSysColorBrush
AppendMenuA
IsWindow
PostMessageA
CreateWindowExW
CheckRadioButton
GetKeyboardLayout
SendMessageW
UpdateWindow
DialogBoxParamA
GetMonitorInfoW
TranslateMDISysAccel
DestroyWindow
GetMessageA
SetWindowRgn
GetSystemMenu
MapDialogRect
SendDlgItemMessageA
CharNextW
IsIconic
SetCapture
PostMessageW
GetParent
SetParent
GetClientRect
SetFocus
DrawEdge
BeginPaint
GetDC
GetQueueStatus
SetDlgItemInt
OffsetRect
SetRect
GetScrollInfo
GetWindowLongW
GetWindowTextW
PeekMessageA
ScrollWindow
EndDialog
SetWindowsHookExA
DestroyCaret
GetDesktopWindow
GetMenuItemCount
RemoveMenu
InsertMenuW
ReleaseCapture
SetDlgItemTextW
GetDlgCtrlID
GetCaretBlinkTime
SetScrollInfo
ValidateRect
SetWindowTextA
gdi32
GetBitmapBits
BitBlt
LineTo
MaskBlt
GetCharacterPlacementW
SetDIBColorTable
CopyEnhMetaFileA
SetMapMode
SelectPalette
CreateRectRgn
GetCharABCWidthsFloatA
Polyline
SetTextAlign
CreateDIBitmap
GetPixel
ExtTextOutA
RestoreDC
CreateCompatibleBitmap
EndPage
PatBlt
SetTextColor
CreateFontIndirectA
GetDIBits
ExcludeClipRect
CreateHalftonePalette
GetPaletteEntries
CreatePenIndirect
CreateCompatibleDC
CreateRectRgnIndirect
GetCurrentPositionEx
SetPaletteEntries
CreatePen
TextOutA
RoundRect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegLoadKeyW
RegConnectRegistryW
QueryServiceStatus
StartServiceW
InitializeSecurityDescriptor
ControlService
GetLengthSid
CopySid
CloseServiceHandle
shell32
ExtractIconExW
ShellExecuteExW
CommandLineToArgvW
SHGetFileInfoW
Shell_NotifyIconW
oleaut32
SysFreeString
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
Sections
.text Size: 677KB - Virtual size: 676KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vWPtJ Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ