Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_4e61d406ac5edf6514d6458788eed7f2_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_4e61d406ac5edf6514d6458788eed7f2_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_4e61d406ac5edf6514d6458788eed7f2_bkransomware
-
Size
6.7MB
-
MD5
4e61d406ac5edf6514d6458788eed7f2
-
SHA1
929bf680e868babdb77b2b2b9ae6423f7a492a3c
-
SHA256
20d3147068897af70e3dacfa1daf672720095fdf5a8da6b7c1a06af3ac893f0f
-
SHA512
3cb2541f551f434f8438830591865c53512f8fb61e0d10c97012b6d7d0e73434287816d483db91a480b2e3a3aa99d6e0182c3972642feca5f14f718fd9627560
-
SSDEEP
98304:LKPpz12zpVttysCXP9H+i8g6hdg8prGfftqE8nryfTNt3FJz7oArAY0kOTgWU7Nk:LEpzmVzvIlV+hgVT/3Pz7oArZ0kOTgq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_4e61d406ac5edf6514d6458788eed7f2_bkransomware
Files
-
2024-10-09_4e61d406ac5edf6514d6458788eed7f2_bkransomware.exe windows:6 windows x86 arch:x86
a608ddf26d10599837908bd395749a93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetACP
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapFree
ExitThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
TlsFree
TlsGetValue
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
DeleteCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
DuplicateHandle
FlushFileBuffers
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
CreateThread
ExpandEnvironmentStringsW
GetThreadTimes
SetEndOfFile
CloseHandle
TlsAlloc
GetStringTypeW
GetModuleHandleA
FindNextFileA
GetOEMCP
CreatePipe
IsValidCodePage
SetLastError
IsDBCSLeadByteEx
FindFirstFileA
RaiseException
GlobalUnlock
GetStartupInfoW
CreateFileW
TerminateProcess
CreateProcessA
LeaveCriticalSection
GetSystemTimeAdjustment
CreateEventA
Sleep
GetLocaleInfoW
WideCharToMultiByte
GetConsoleCP
OpenProcess
TlsSetValue
SetCommState
ExpandEnvironmentStringsA
GetTickCount
WaitForSingleObjectEx
ConnectNamedPipe
WaitForSingleObject
GetModuleHandleExW
QueryPerformanceCounter
InitializeSListHead
GetCurrentProcess
WaitNamedPipeA
GetCommState
LoadLibraryExW
FreeLibrary
GetCPInfo
GetLocaleInfoA
GlobalMemoryStatus
GetEnvironmentVariableW
GetCommandLineW
ExitProcess
EnumSystemLocalesW
GetProcessTimes
GetCurrentProcessId
FindNextFileW
GetModuleFileNameA
LoadLibraryA
EnterCriticalSection
MultiByteToWideChar
MulDiv
IsProcessorFeaturePresent
SetCommTimeouts
GetCommandLineA
SetCommBreak
GetEnvironmentStringsW
SetDllDirectoryW
GetNumaHighestNodeNumber
WriteConsoleW
user32
DestroyWindow
EndPaint
DestroyAcceleratorTable
GetSystemMenu
GetMessageW
ToAsciiEx
SetCursor
ClientToScreen
RegisterClassA
CopyRect
SendDlgItemMessageA
IsIconic
KillTimer
DrawIconEx
LoadStringA
GetParent
LoadIconA
SetParent
SetFocus
GetWindowTextLengthA
SetScrollRange
WaitMessage
GetQueueStatus
DrawFocusRect
ShowCursor
GetKeyboardState
InflateRect
GetWindowTextA
GetKeyboardLayout
CheckMenuRadioItem
GetScrollInfo
MessageBoxA
DrawStateW
GetDlgItem
ScrollWindow
SetWindowsHookExA
ShowWindow
AppendMenuA
CreateCaret
IsWindow
PostMessageA
RemoveMenu
FlashWindow
CreateWindowExW
SetCaretPos
InsertMenuA
SetWindowTextA
SendMessageW
UpdateWindow
EnableWindow
DestroyMenu
LoadCursorA
DialogBoxParamA
ToUnicode
DrawFrameControl
ShowOwnedPopups
GetMessageA
HideCaret
CreateDialogParamA
TrackPopupMenu
GetClientRect
ShowCaret
GetDC
GetCapture
GetWindowPlacement
SetWindowLongA
ReleaseDC
EnableMenuItem
EndDialog
DestroyCursor
GetDesktopWindow
CheckDlgButton
SetMenu
CreatePopupMenu
IsDlgButtonChecked
EnableScrollBar
MessageBoxW
ScrollWindowEx
GetSystemMetrics
EndMenu
GetDlgItemTextA
GetCaretBlinkTime
DestroyIcon
ValidateRect
CheckMenuItem
gdi32
SetTextColor
Polygon
GetDeviceCaps
StretchBlt
CopyEnhMetaFileA
CreateHalftonePalette
GetRgnBox
CreatePalette
SelectObject
CreateCompatibleDC
PlayEnhMetaFile
RectInRegion
SetMapMode
OffsetRgn
ExtCreateRegion
RealizePalette
GetObjectType
StretchDIBits
GetBkColor
SelectPalette
GetCharWidth32A
GetTextExtentPointA
GetCharABCWidthsFloatA
GetClipBox
RectVisible
SetTextAlign
IntersectClipRect
GetPixel
GetMetaFileBitsEx
CreateEnhMetaFileW
RestoreDC
CreateSolidBrush
TextOutA
BitBlt
PatBlt
LineTo
CreateFontIndirectA
ExcludeClipRect
GdiFlush
GetEnhMetaFileHeader
PtInRegion
CreatePenIndirect
Rectangle
Ellipse
SaveDC
GetTextExtentPointW
GetTextExtentExPointA
GetCharABCWidthsW
GetNearestPaletteIndex
CreateRectRgn
GetSystemPaletteEntries
CreatePatternBrush
Polyline
CreatePen
RoundRect
GetStockObject
SetWindowExtEx
GetTextExtentPoint32A
Arc
TranslateCharsetInfo
SetWindowOrgEx
MoveToEx
CloseEnhMetaFile
SetROP2
ExtCreatePen
advapi32
LookupPrivilegeValueW
EqualSid
CopySid
OpenProcessToken
GetUserNameA
RegQueryValueExW
AdjustTokenPrivileges
shell32
ShellExecuteExW
ole32
CoTaskMemFree
Sections
.text Size: 695KB - Virtual size: 695KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PMyUu Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ