Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_b9cad1b5042d64775eba7a1e2bf3c031_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_b9cad1b5042d64775eba7a1e2bf3c031_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_b9cad1b5042d64775eba7a1e2bf3c031_bkransomware
-
Size
521KB
-
MD5
b9cad1b5042d64775eba7a1e2bf3c031
-
SHA1
e8339d0a47c40b5ad24c1c051f585f079c11df88
-
SHA256
19a7cf86d6e9cee8d63cf2d3dfeb265b96c4fbef1dd029665339015c312ffbd9
-
SHA512
830db80cfb168e56f9156fb70c773bbbbc5c2b6f7baee9378ca6c5d8dd84e2dd73b664cb6c4bb0c5302590a30e03dab61b91f93562df5d3f7ae14dbd1b69732a
-
SSDEEP
6144:n3YNPrHWx+/UEx3dnVrZZhI33TfHQ20V79C5WIqJe0VAHOGqGPFfphw8IM:nELWx+/Fx3nZg330f9lIqJe0VAv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-13_b9cad1b5042d64775eba7a1e2bf3c031_bkransomware
Files
-
2024-10-13_b9cad1b5042d64775eba7a1e2bf3c031_bkransomware.exe windows:5 windows x86 arch:x86
abfb5d389831437f3c45f42c03f20595
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextColor
GetDCBrushColor
UpdateColors
SetSystemPaletteUse
SetTextCharacterExtra
SetPixel
GetCurrentObject
GetMapMode
GetStretchBltMode
GetRandomRgn
GetMetaRgn
GetTextCharset
GetDeviceCaps
GetTextAlign
GetPolyFillMode
GetNearestPaletteIndex
user32
GetMenuContextHelpId
GetCursor
GetDlgItemInt
IsWindowUnicode
GetPropA
GetWindowContextHelpId
SetWindowTextA
IsWindowEnabled
GetMenuCheckMarkDimensions
GetMenuItemCount
ShowWindow
BeginPaint
GetWindowDC
EndDialog
DrawTextA
WindowFromDC
CheckDlgButton
GetDlgItem
SetDlgItemTextA
RemovePropA
GetScrollPos
GetWindowLongA
SetFocus
MoveWindow
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
GetProcAddress
GetModuleHandleA
MoveFileA
GetCurrentThreadId
GlobalSize
GetDriveTypeA
LoadResource
GetCurrentProcess
GetCurrentProcessId
CloseHandle
GetTickCount
GetLastError
SetFilePointer
GlobalHandle
IsDebuggerPresent
FindResourceA
WriteFile
GlobalFlags
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
IsProcessorFeaturePresent
GetProcessHeap
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
GetConsoleCP
GetConsoleMode
GetCurrentThread
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetFilePointerEx
SetEnvironmentVariableA
Sections
.text Size: 442KB - Virtual size: 441KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE