Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_4b26ba7854ad3ba6e18b5aaf702bdd52_bkransomware.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-18_4b26ba7854ad3ba6e18b5aaf702bdd52_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_4b26ba7854ad3ba6e18b5aaf702bdd52_bkransomware
-
Size
463KB
-
MD5
4b26ba7854ad3ba6e18b5aaf702bdd52
-
SHA1
fdc55cf6d52dea6399847923b7d651faa2742447
-
SHA256
c84fd630f002684024f4388dde37ed021fdac6b67edd2b7a7a9b30d5b1406711
-
SHA512
570afbee4639d9eedefdda331ac7bdd38fd86db364a588d3fee07798ebd55f050f9b8f16f4a3982fcf0756df4731ff472565bd75723f5957c6ad564a0bfbeb10
-
SSDEEP
6144:mQDUJ0rG+k5LFdaUjSzjrQHocPYfo+dwAVhAOPzSFA2zOc08h0MgM:3UJ0rGzYfxAO7gA5R4X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-18_4b26ba7854ad3ba6e18b5aaf702bdd52_bkransomware
Files
-
2024-10-18_4b26ba7854ad3ba6e18b5aaf702bdd52_bkransomware.exe windows:5 windows x86 arch:x86
0e280fb554e9e56e10b163ecdcc8a12b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
GetTextCharset
GetPolyFillMode
GetNearestColor
GetNearestPaletteIndex
GetMetaRgn
GetObjectType
UpdateColors
GetTextCharsetInfo
GetFontLanguageInfo
GetSystemPaletteUse
SetSystemPaletteUse
user32
GetDialogBaseUnits
SetFocus
SetDlgItemTextA
GetMenuItemCount
GetWindowLongA
SendMessageA
EndDialog
ShowWindow
GetMenu
CallWindowProcA
EndPaint
IsWindowUnicode
PostMessageA
GetDlgItem
LoadIconA
GetDC
IsWindowEnabled
BeginPaint
MoveWindow
SetWindowTextA
GetQueueStatus
EnableWindow
GetInputState
GetScrollPos
DrawTextA
GetPropA
GetDlgItemInt
GetMenuItemID
GetMenuCheckMarkDimensions
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetProcAddress
GetModuleHandleA
LocalFlags
MoveFileA
GlobalFlags
GetCurrentProcess
GetDriveTypeA
GetTickCount
GetCurrentProcessId
GlobalAlloc
IsDebuggerPresent
DeleteFileA
SetFilePointer
GlobalHandle
GetStdHandle
SizeofResource
IsProcessorFeaturePresent
GetCurrentThreadId
LockResource
GetFileType
GetLastError
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetProcessHeap
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetModuleFileNameA
SetEnvironmentVariableA
Sections
.text Size: 393KB - Virtual size: 393KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE