Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_e223169c959059e31b1b5811365e40e2_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_e223169c959059e31b1b5811365e40e2_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_e223169c959059e31b1b5811365e40e2_bkransomware
-
Size
575KB
-
MD5
e223169c959059e31b1b5811365e40e2
-
SHA1
8edafebf3329c44f0cf849b50f5b2eb570822405
-
SHA256
b4dacb581f3e97ab15f389cbefba2b97252c649f4a8a3391bf2b9851441816d5
-
SHA512
c098663ec6e61a477833aa01e37558ae7b85d61f0b4ddee5e2aaabb7ee0d81cc508385320ebee48e04925b0b03c5e0a983de0981c54f9c91e0ba3bd1819ede1f
-
SSDEEP
12288:VvBAM+mnnWpMWRXP7fANJPXccxB7rcdzMpoq0/C1ljG:h+MtWpMWR7fANdX37rce/0/C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-18_e223169c959059e31b1b5811365e40e2_bkransomware
Files
-
2024-10-18_e223169c959059e31b1b5811365e40e2_bkransomware.exe windows:5 windows x86 arch:x86
677dd95018532bfd006f9c6d61938fd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetNearestColor
GetObjectType
GetPixelFormat
GetTextAlign
GetGraphicsMode
SetTextCharacterExtra
GetSystemPaletteUse
GetDCBrushColor
GetTextColor
UpdateColors
GetTextCharacterExtra
GetTextCharsetInfo
SetTextJustification
GetDCPenColor
GetMapMode
GetNearestPaletteIndex
GetMetaRgn
SetSystemPaletteUse
SetPixel
GetRandomRgn
GetPolyFillMode
GetFontLanguageInfo
user32
GetMenuCheckMarkDimensions
GetPropA
GetWindowContextHelpId
GetDlgItemInt
GetMenu
IsWindowEnabled
GetForegroundWindow
GetDC
ShowWindow
SetWindowTextA
IsWindowUnicode
GetQueueStatus
GetMenuItemCount
MoveWindow
CheckDlgButton
EndDialog
DrawTextA
PostMessageA
GetMenuItemID
GetWindowDC
GetMenuContextHelpId
EndPaint
GetCursor
CallWindowProcA
WindowFromDC
GetDlgItem
RemovePropA
LoadIconA
GetWindowLongA
BeginPaint
GetInputState
kernel32
SetEndOfFile
SetEnvironmentVariableA
CreateProcessW
WriteConsoleW
SetStdHandle
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
RaiseException
CreatePipe
GetExitCodeProcess
WaitForSingleObject
DeleteFileW
GetFileAttributesExW
ReadConsoleW
GetProcAddress
GetModuleHandleA
LockResource
DeleteFileA
GlobalSize
IsDebuggerPresent
GetProcessHeap
GetLastError
LocalFlags
IsProcessorFeaturePresent
GetFileTime
GlobalFlags
GetVersion
FindResourceA
GetFileType
GetStdHandle
GlobalHandle
GetCurrentProcess
GetTickCount
FlushFileBuffers
GetCurrentThreadId
GlobalAlloc
LoadResource
FindClose
GetDriveTypeA
WriteFile
GetCurrentProcessId
MoveFileA
CloseHandle
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimeAsFileTime
HeapReAlloc
ReadFile
SetErrorMode
GetFullPathNameW
DuplicateHandle
CreateProcessA
GetFullPathNameA
GetTempPathW
GetCommandLineA
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetCurrentThread
GetConsoleCP
GetConsoleMode
GetStringTypeW
GetTimeZoneInformation
SetFilePointerEx
SetEnvironmentVariableW
Sections
.text Size: 510KB - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE