Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_eaaa0d0f06bc8955480cecdff977b140_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_eaaa0d0f06bc8955480cecdff977b140_bkransomware.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_eaaa0d0f06bc8955480cecdff977b140_bkransomware
-
Size
601KB
-
MD5
eaaa0d0f06bc8955480cecdff977b140
-
SHA1
0861bf4e519da953532e5ccdf2046a89384a8c23
-
SHA256
fac689081d432d2f62fd10f360180bd3acb27a46f0a7d3f860b720f84db66f4c
-
SHA512
e3cc97d4f862fcfa91f470a917aa9a2ee6e6ec7656907d8c43681a8efdbd5c77d7bbda20023e774b1be5a5708f400c7c30e78166218fc8cbe0099bbf69395e76
-
SSDEEP
12288:FK5ua7PIsQ9v71AQu4Psx/kgcrK+OyQe+S:Fu17PZA7eB4R3VQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-18_eaaa0d0f06bc8955480cecdff977b140_bkransomware
Files
-
2024-10-18_eaaa0d0f06bc8955480cecdff977b140_bkransomware.exe windows:5 windows x86 arch:x86
3ee239bf1085780519cfa96164461019
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStretchBltMode
GetObjectType
GetFontLanguageInfo
GetBkColor
GetPixelFormat
GetPolyFillMode
GetClipRgn
GetTextCharacterExtra
GetGraphicsMode
GetDCPenColor
SetTextAlign
GetCurrentObject
GetDCBrushColor
GetFontUnicodeRanges
SetSystemPaletteUse
GetMapMode
GetRandomRgn
GetSystemPaletteUse
GetNearestColor
GetTextCharset
GetDeviceCaps
SetTextJustification
GetTextAlign
GetTextColor
GetTextCharsetInfo
user32
GetMenuCheckMarkDimensions
GetScrollPos
GetWindowDC
EnableWindow
WindowFromDC
GetDC
EndDialog
GetPropA
GetMenuItemID
GetForegroundWindow
GetMenu
IsWindowUnicode
SetWindowTextA
ShowWindow
GetDlgItemInt
GetMenuItemCount
GetKeyboardType
GetWindowLongA
EndPaint
GetInputState
GetQueueStatus
GetDlgItem
GetMenuState
MoveWindow
CheckDlgButton
SetDlgItemTextA
DrawTextA
SetFocus
GetDialogBaseUnits
RemovePropA
BeginPaint
SendMessageA
IsWindowEnabled
GetCursor
kernel32
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetCurrentDirectoryW
SetCurrentDirectoryW
WriteConsoleW
GetExitCodeProcess
WaitForSingleObject
CreateFileW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
OutputDebugStringW
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetDriveTypeW
RaiseException
DeleteFileW
CreateProcessA
CreatePipe
ReadConsoleW
GetFileAttributesExW
GetFullPathNameW
RtlUnwind
SetFilePointerEx
GetProcAddress
FindClose
GetTickCount
GetCurrentProcess
GetLastError
GetCurrentThreadId
GetVersion
GlobalFlags
GetModuleHandleA
DeleteFileA
FlushFileBuffers
GlobalSize
LockResource
GlobalHandle
MoveFileA
SetFilePointer
GetFileType
LocalFlags
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WriteFile
IsDebuggerPresent
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetTempPathA
GetLocalTime
Beep
Sleep
GetTimeZoneInformation
CloseHandle
DuplicateHandle
CreateProcessW
GetFullPathNameA
ReadFile
GetSystemTimeAsFileTime
GetCommandLineA
GetStdHandle
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleCP
GetConsoleMode
MoveFileExW
SetEndOfFile
Sections
.text Size: 543KB - Virtual size: 543KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE