Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_9e7ab82328da1f778a15135e2ec4cb9e_bkransomware.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-13_9e7ab82328da1f778a15135e2ec4cb9e_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_9e7ab82328da1f778a15135e2ec4cb9e_bkransomware
-
Size
493KB
-
MD5
9e7ab82328da1f778a15135e2ec4cb9e
-
SHA1
dff00078d604f20d3f28bd3d7245dc9a130b720d
-
SHA256
0d0b30c7cd880bb9cf6fca9735f5c9c5f3f294ff2a1ff6803ef5999092043754
-
SHA512
f8df72c5c8f34bfb20d339af594a04eddb8be9ba0b9930084a71dded37926d6fb28e5e0a82b85fd864b5d1073b3658d426add425f46da366c733bf187c526ee2
-
SSDEEP
12288:VsU87KyJ76Z7onIP8ZSupKo4DlOEHEcfnTFt6:y37J74vPh5o43k4nTq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-13_9e7ab82328da1f778a15135e2ec4cb9e_bkransomware
Files
-
2024-10-13_9e7ab82328da1f778a15135e2ec4cb9e_bkransomware.exe windows:5 windows x86 arch:x86
aa1eda0eaaf3267d2ac59a5baf0df92f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetPolyFillMode
GetStretchBltMode
GetObjectType
SetPixel
GetRandomRgn
GetSystemPaletteUse
GetTextColor
GetTextCharacterExtra
GetNearestColor
GetTextAlign
GetClipRgn
GetNearestPaletteIndex
GetTextCharset
GetCurrentObject
user32
EndPaint
CallWindowProcA
GetKeyboardType
GetWindowContextHelpId
GetDlgItem
DrawTextA
GetScrollPos
GetWindowLongA
EnableWindow
RemovePropA
IsWindowUnicode
GetCursor
SetFocus
GetWindowDC
GetMenuItemCount
GetForegroundWindow
WindowFromDC
ShowWindow
GetMenuCheckMarkDimensions
IsWindowEnabled
PostMessageA
SendMessageA
SetDlgItemTextA
GetInputState
GetDC
SetWindowTextA
LoadIconA
GetDlgItemInt
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetProcAddress
GetTickCount
GetFileType
IsProcessorFeaturePresent
GetCurrentProcess
GetProcessHeap
GlobalAlloc
GetVersion
IsDebuggerPresent
GlobalSize
GetLastError
SetFilePointer
FlushFileBuffers
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleHandleA
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameA
QueryPerformanceCounter
SetEnvironmentVariableA
Sections
.text Size: 432KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE