Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_04d0fbb14be00f41490c0289e5d23f09_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_04d0fbb14be00f41490c0289e5d23f09_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_04d0fbb14be00f41490c0289e5d23f09_bkransomware
-
Size
6.7MB
-
MD5
04d0fbb14be00f41490c0289e5d23f09
-
SHA1
6ea386c84083e608842936b1cf4509e8d218b4d1
-
SHA256
dfcf41d378765140cc953070c0682e9f7c4f68ae00db0072310470305d6d4b86
-
SHA512
6d10b0bde65eb04b491bb7079006de88ffc6b7f3edcb489fc5a36ed0f19388513ff62a94bffb024f03217639841c815274599f62ac05767c47caa4a4e8b08702
-
SSDEEP
98304:ebeOZZ2NueHJo3AHTL2/ivGWHXch1w1iR6ER+QtpKhj1VFnxARWuCUlIVY:ebeOQr/W/i+WHXcbsGtpKN7buCUlD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_04d0fbb14be00f41490c0289e5d23f09_bkransomware
Files
-
2024-10-09_04d0fbb14be00f41490c0289e5d23f09_bkransomware.exe windows:6 windows x86 arch:x86
a33521d8ef713fefc296909b13dc54c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
EnumResourceNamesW
ResumeThread
SuspendThread
DeleteFileW
WinExec
EnumResourceTypesW
DeviceIoControl
RemoveDirectoryW
LockResource
GetExitCodeThread
GetDiskFreeSpaceW
GetCPInfoExW
GetPrivateProfileIntW
ExitThread
FileTimeToSystemTime
GetFileAttributesW
GetExitCodeProcess
GetVersionExW
Sleep
LoadLibraryW
GetSystemDirectoryW
GetUserDefaultLCID
VerSetConditionMask
LoadResource
FindResourceW
SetErrorMode
SetFilePointer
FileTimeToLocalFileTime
GetSystemDefaultUILanguage
GetWindowsDirectoryW
IsDebuggerPresent
VirtualAlloc
GetThreadLocale
SetThreadLocale
WritePrivateProfileStringW
lstrcpynW
HeapCreate
GetUserDefaultLangID
VirtualQueryEx
GetPrivateProfileStringW
GetLogicalDrives
CreateDirectoryW
EnumCalendarInfoW
GetLogicalProcessorInformation
RaiseException
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
CloseHandle
DuplicateHandle
WaitForSingleObject
CreateFileW
user32
ShowOwnedPopups
SetCursor
GetMessageA
SetTimer
HideCaret
GetWindowRect
CharUpperBuffW
GetMessageW
PostQuitMessage
SendDlgItemMessageA
CharNextW
SetKeyboardState
MsgWaitForMultipleObjects
DeleteMenu
GetParent
AttachThreadInput
RemovePropA
MessageBeep
SetParent
SetFocus
GetWindowTextLengthA
ModifyMenuW
ShowCaret
BeginPaint
GetQueueStatus
SetDlgItemInt
GetMenu
GetWindowPlacement
SetPropA
GetScrollInfo
MessageBoxA
UnionRect
ReleaseDC
SetClassLongA
CharUpperW
EndDialog
SetWindowsHookExA
LoadIconA
EnumChildWindows
ShowWindow
SetMenu
CreatePopupMenu
GetMenuItemCount
CreateCaret
PostMessageA
RemoveMenu
FlashWindow
GetKeyboardType
CreateWindowExW
CheckRadioButton
SetCaretPos
SetWindowTextA
SendMessageW
UpdateWindow
LoadCursorA
SetDlgItemTextA
SetScrollInfo
ValidateRect
GetMonitorInfoW
CheckMenuItem
TranslateMDISysAccel
GetMessageTime
RegisterClassA
TrackPopupMenu
EndPaint
GetDlgItemInt
MapDialogRect
IsIconic
GetSubMenu
CharLowerBuffW
SetScrollRange
WaitMessage
GetDC
GetCapture
SetRect
LoadMenuW
UnregisterClassA
GetDlgItem
SetWindowLongW
SendDlgItemMessageW
GetDesktopWindow
GetSysColor
GetSysColorBrush
IsWindow
InsertMenuW
GetSystemMetrics
GetDlgCtrlID
GetDlgItemTextA
CheckDlgButton
gdi32
MoveToEx
BitBlt
GetTextExtentPoint32W
LineTo
SetTextColor
GetCharacterPlacementW
CreateFontIndirectW
CreateFontA
ExcludeClipRect
GdiFlush
SetPixel
CreatePalette
CreateBitmap
CreatePenIndirect
CreateRectRgnIndirect
SetMapMode
CreateCompatibleBitmap
Rectangle
CreateBrushIndirect
RealizePalette
SelectPalette
SetPaletteEntries
GetCharWidth32A
GetSystemPaletteEntries
Polyline
CreatePen
RoundRect
ExtTextOutA
RestoreDC
CreateSolidBrush
TextOutA
MaskBlt
CreateRectRgn
ExtCreatePen
EndPage
TranslateCharsetInfo
DeleteDC
GetDeviceCaps
CreateFontIndirectA
GetDIBits
SetDIBColorTable
CopyEnhMetaFileA
CreateHalftonePalette
DeleteObject
SelectObject
SaveDC
GetObjectType
GetTextExtentPointA
RectVisible
IntersectClipRect
GetPixel
GetStockObject
UpdateColors
GetCharABCWidthsFloatA
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegUnLoadKeyW
RegSetValueExW
RegLoadKeyW
RegEnumKeyExW
ControlService
GetLengthSid
GetUserNameA
AllocateAndInitializeSid
QueryServiceStatus
RegQueryInfoKeyW
ChangeServiceConfigW
RegConnectRegistryW
StartServiceW
RegGetKeySecurity
EqualSid
OpenServiceW
shell32
ShellExecuteW
SHGetFileInfoW
ShellExecuteExW
Shell_NotifyIconW
CommandLineToArgvW
ExtractIconExW
oleaut32
SysFreeString
SysAllocStringLen
VariantInit
SafeArrayCreate
VariantChangeType
Sections
.text Size: 707KB - Virtual size: 707KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DxFKs Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ