Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_aa7289cd90e17c7091b45334df5a28e4_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-13_aa7289cd90e17c7091b45334df5a28e4_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_aa7289cd90e17c7091b45334df5a28e4_bkransomware
-
Size
582KB
-
MD5
aa7289cd90e17c7091b45334df5a28e4
-
SHA1
bbfab9d34387b0ae2b49beff50210d689ede5dd5
-
SHA256
4a589e98f64a18951a45a1169635aa586774936e36b480545f64e435f52090b2
-
SHA512
ef1666f337604b917db6b142f2f3f8666fbefcb7cc023524a31e0d8c8b4b0ae37c76e32deaed0a75da58d4be53f1d738b118d49c449191952f7ab7922f2cad3e
-
SSDEEP
12288:13MHD7n9r80mnbbrsZROZ3LJUu+hu6nWQOqC//wk9Cqp90:BMHD7n9o0mbbrsvyJR+82WQAxta
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-13_aa7289cd90e17c7091b45334df5a28e4_bkransomware
Files
-
2024-10-13_aa7289cd90e17c7091b45334df5a28e4_bkransomware.exe windows:5 windows x86 arch:x86
cad73e04d8236961e2acc731deaabd28
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
GetFontLanguageInfo
SetTextJustification
GetStretchBltMode
GetMapMode
SetTextColor
GetDCPenColor
GetFontUnicodeRanges
GetClipRgn
SetTextAlign
GetGraphicsMode
GetSystemPaletteUse
SetSystemPaletteUse
user32
WindowFromDC
GetMenu
GetScrollPos
GetMenuCheckMarkDimensions
GetWindowContextHelpId
IsWindowUnicode
GetQueueStatus
GetWindowLongA
DrawTextA
MoveWindow
SetWindowTextA
GetDC
RemovePropA
CallWindowProcA
GetMenuItemID
BeginPaint
GetInputState
GetWindowDC
IsWindowEnabled
GetMenuItemCount
SetFocus
EndDialog
SendMessageA
ShowWindow
GetMenuState
GetKeyboardType
LoadIconA
GetForegroundWindow
PostMessageA
GetCursor
GetPropA
GetDlgItemInt
EndPaint
EnableWindow
CheckDlgButton
SetDlgItemTextA
GetDlgItem
kernel32
ReadConsoleW
SetEndOfFile
ReadFile
SetEnvironmentVariableW
GetExitCodeProcess
WaitForSingleObject
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetFilePointerEx
OutputDebugStringW
GetModuleFileNameA
GetFullPathNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
RaiseException
CreateProcessA
GetFileAttributesExW
CreatePipe
GetStringTypeW
GetFullPathNameA
SetStdHandle
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
GetProcAddress
GetModuleHandleA
GetTickCount
SetFilePointer
SizeofResource
CloseHandle
GetFileTime
GlobalHandle
IsProcessorFeaturePresent
GlobalFlags
GetCurrentThreadId
LocalFlags
GetProcessHeap
GetDriveTypeA
LockResource
GetLastError
GetCurrentProcess
GetStdHandle
FindResourceA
QueryPerformanceCounter
GetCurrentProcessId
GlobalSize
FindClose
LoadResource
FlushFileBuffers
GetFileType
WriteFile
DeleteFileA
GlobalAlloc
IsDebuggerPresent
GetVersion
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
DuplicateHandle
CreateProcessW
GetTempPathW
GetTimeZoneInformation
DeleteFileW
GetLocalTime
GetCommandLineA
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
SetEnvironmentVariableA
Sections
.text Size: 510KB - Virtual size: 510KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE