Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_2904355a664fbd8faec5cc0898061145_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_2904355a664fbd8faec5cc0898061145_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_2904355a664fbd8faec5cc0898061145_bkransomware
-
Size
566KB
-
MD5
2904355a664fbd8faec5cc0898061145
-
SHA1
8a5de9b2d1485143b7da2e17a9466ce2c2863fc0
-
SHA256
f9723d5a86a8df1f7f55df0c2517bbb70ca1499180824ad98175701e5410f4cb
-
SHA512
6724d1d1dd06516af054177e0cfc5231b5f49ce539e27167999e3a5c8cd9ce06a84339f70a61f0aab12bbf9a26aa1d91f5893f2f2996ed5691dfa73ed9dc3196
-
SSDEEP
12288:UxBxn4c4yKyKA7Ahjvs2rHtnQOx1jIMl:Uxcc4VcQFTB5vx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-06_2904355a664fbd8faec5cc0898061145_bkransomware
Files
-
2024-10-06_2904355a664fbd8faec5cc0898061145_bkransomware.exe windows:5 windows x86 arch:x86
04a3edb973620d496f10965c4322495d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetFontUnicodeRanges
UpdateColors
SetTextColor
GetDeviceCaps
GetTextColor
SetPixel
GetMapMode
SetTextAlign
SetTextJustification
GetTextAlign
GetTextCharset
GetTextCharacterExtra
GetFontLanguageInfo
GetNearestColor
GetTextCharsetInfo
user32
WindowFromDC
GetMenuItemID
GetDialogBaseUnits
GetKeyboardType
IsWindowUnicode
GetDlgItemInt
GetScrollPos
GetDC
GetInputState
GetCursor
GetMenuItemCount
GetDlgItem
EnableWindow
BeginPaint
GetQueueStatus
SetFocus
SetDlgItemTextA
GetMenuCheckMarkDimensions
SetWindowTextA
ShowWindow
EndDialog
IsWindowEnabled
MoveWindow
RemovePropA
EndPaint
GetWindowLongA
GetPropA
GetForegroundWindow
GetMenuContextHelpId
SendMessageA
DrawTextA
CallWindowProcA
PostMessageA
LoadIconA
CheckDlgButton
GetMenuState
GetMenu
GetWindowContextHelpId
kernel32
SetEndOfFile
GetTimeZoneInformation
WriteConsoleW
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
GetModuleFileNameA
SetStdHandle
GetFileAttributesExW
GetStringTypeW
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetEnvironmentVariableW
SetEnvironmentVariableA
ReadConsoleW
SetFilePointerEx
CloseHandle
GetConsoleMode
GetConsoleCP
RtlUnwind
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetProcAddress
GetModuleHandleA
LocalFlags
DeleteFileA
IsProcessorFeaturePresent
GetTickCount
GetVersion
MoveFileA
IsDebuggerPresent
FindClose
QueryPerformanceCounter
GetCurrentProcessId
GetLastError
GlobalSize
GetFileTime
GlobalHandle
FlushFileBuffers
SetFilePointer
LockResource
WriteFile
GetCurrentProcess
GetCurrentThreadId
GetDriveTypeA
FindResourceA
GetFileType
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
ReadFile
DeleteFileW
SetErrorMode
Beep
Sleep
GetTempPathW
GetCommandLineA
GetProcessHeap
GetStdHandle
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetFullPathNameA
Sections
.text Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE