Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
Target
Trojan-Ransom.Win32.Blocker.eczp-0775baff8197603e541f09b4f2f7f09a85533edb7cac6c2dae7839b884b6b910
Size
80KB
MD5
7682c7039a70951040c51f6319108d50
SHA1
06c2d857c6dc34b00fc44d406f36a1b9518ca80a
SHA256
0775baff8197603e541f09b4f2f7f09a85533edb7cac6c2dae7839b884b6b910
SHA512
cbca3370252270c43549b9f36520e1bd1a8f097929db5ef338bdae9b561137e7da664a0b9dca8598f62888b19a882017e147035585f22a9485e6d0280ff13f67
SSDEEP
1536:Pz0b+sq1Ucj76b7ORr1+tBLZgVpsInrxyZeMB+agxCxw:8ryLj76WRrlrjly8MNgT
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
malloc
wcscat
wcscpy
wcslen
_wcsnicmp
_initterm
free
wcschr
LocalFree
GetComputerNameExW
LocalAlloc
lstrlenW
FormatMessageW
LoadLibraryExW
LoadLibraryW
GlobalLock
GetCurrentProcess
GetComputerNameW
CreateProcessW
GetWindowsDirectoryW
LoadLibraryExA
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
GetProcAddress
FreeLibrary
GetVersionExW
ReleaseMutex
GetModuleFileNameW
CloseHandle
CreateMutexW
QueryPerformanceCounter
WaitForSingleObject
GlobalUnlock
VirtualAllocEx
CreateEventA
Thread32Next
DefineDosDeviceA
Thread32First
SetTimerQueueTimer
GetCalendarInfoA
SetLastConsoleEventActive
SetComputerNameExW
OpenConsoleW
CreateHardLinkW
GetPrivateProfileIntA
WriteProfileStringW
CreateMailslotA
LZRead
_lread
FindNextFileA
CreateJobObjectW
GetCommConfig
IsSystemResumeAutomatic
OpenJobObjectA
ClearCommBreak
ReleaseSemaphore
AssignProcessToJobObject
lstrcmpi
WaitForSingleObjectEx
EnumResourceNamesA
AddLocalAlternateComputerNameW
GetConsoleAliasExesA
CreateThread
ScrollConsoleScreenBufferA
ReadFileEx
GetStdHandle
VerSetConditionMask
VirtualProtectEx
GetDevicePowerState
lstrcatA
ConvertFiberToThread
GetComputerNameExA
DnsHostnameToComputerNameA
RtlCaptureContext
PrivMoveFileIdentityW
SetNamedPipeHandleState
GetProcessShutdownParameters
FatalAppExitA
DeleteTimerQueueTimer
SignalObjectAndWait
CreateSocketHandle
SetTimeZoneInformation
SetEnvironmentVariableW
GetBinaryTypeA
GlobalFlags
SetCommConfig
ExitVDM
GetNumberOfConsoleInputEvents
GetProcessWorkingSetSize
GetConsoleProcessList
SetPriorityClass
lstrcmpW
DebugBreakProcess
CopyFileExW
GetConsoleInputExeNameA
SetThreadAffinityMask
UnregisterConsoleIME
GetThreadContext
GetStringTypeExA
ReadConsoleOutputCharacterW
LocalCompact
CreateTapePartition
FillConsoleOutputAttribute
SetConsoleScreenBufferSize
GetProfileStringA
lstrcpyA
LZSeek
RequestDeviceWakeup
GetConsoleMode
IsBadStringPtrA
DeleteCriticalSection
SetErrorMode
GetSystemTimeAdjustment
GetConsoleCommandHistoryLengthW
CreateActCtxA
SetFileAttributesA
GetSystemWindowsDirectoryA
CreateJobSet
CreateWaitableTimerW
EnumCalendarInfoExW
OpenSemaphoreW
SwitchToFiber
GetPrivateProfileSectionW
CommConfigDialogA
ReplaceFile
GetVolumePathNamesForVolumeNameA
GetNumaNodeProcessorMask
SetEvent
SetSystemTime
SetConsoleOS2OemFormat
PeekNamedPipe
SizeofResource
LocalReAlloc
CreateEventW
WritePrivateProfileStructW
RtlMoveMemory
SetThreadLocale
CreateRemoteThread
FillConsoleOutputCharacterW
TzSpecificLocalTimeToSystemTime
GetFileAttributesW
CloseProfileUserMapping
EnumCalendarInfoA
Heap32ListFirst
GetProcessPriorityBoost
GetCommProperties
DebugBreak
GetNamedPipeInfo
GlobalFindAtomW
GetDiskFreeSpaceW
FreeEnvironmentStringsA
CmdBatNotification
MoveFileA
EnumSystemLanguageGroupsW
EndUpdateResourceW
WaitCommEvent
LZClose
GetDiskFreeSpaceExW
FindNextChangeNotification
GetExitCodeThread
DuplicateConsoleHandle
FindActCtxSectionStringA
FindFirstFileW
SetWindowTextW
IsWindowEnabled
DestroyIcon
LoadImageW
GetSystemMetrics
WinHelpW
GetParent
DialogBoxParamW
GetWindowLongW
EndDialog
SetWindowLongW
GetFocus
RegisterClipboardFormatW
wvsprintfW
wsprintfW
LoadStringW
MessageBoxW
CheckDlgButton
EnableWindow
SetDlgItemTextW
SetRect
CreateWindowExW
SendMessageW
LoadCursorW
SetCursor
SetFocus
IsDlgButtonChecked
LoadIconW
CharUpperA
UnhookWinEvent
AppendMenuW
GetGUIThreadInfo
ReplyMessage
GetScrollPos
DdeInitializeW
DdeConnectList
BuildReasonArray
GetProcessWindowStation
TranslateMessage
RegisterClassExA
ModifyMenuA
SetThreadDesktop
PostMessageW
UserLpkTabbedTextOut
RealGetWindowClassA
DrawIcon
PackDDElParam
GetUserObjectInformationW
QuerySendMessage
IsWindowInDestroy
wsprintfA
MsgWaitForMultipleObjectsEx
ScrollWindow
ScreenToClient
OffsetRect
SetWindowStationUser
SetClassLongA
BroadcastSystemMessage
UnhookWindowsHookEx
LoadMenuA
FindWindowA
EnableMenuItem
SetShellWindowEx
RegisterClipboardFormatA
DdeDisconnectList
OpenIcon
BroadcastSystemMessageA
CopyRect
IsGUIThread
TranslateAccelerator
UnlockWindowStation
GetMenuCheckMarkDimensions
GetWindowTextW
IMPGetIMEA
ToUnicodeEx
SetScrollRange
DlgDirSelectExA
IsZoomed
SendMessageTimeoutW
BroadcastSystemMessageExW
MonitorFromRect
SetParent
DdeConnect
SendDlgItemMessageA
GetPropA
DrawFrameControl
IsWindowUnicode
DrawCaptionTempW
GetWindowInfo
GetMenuStringA
DlgDirSelectExW
PrivateExtractIconExW
ToAsciiEx
MessageBoxExW
GetClassNameA
DrawIconEx
GetTopWindow
SetForegroundWindow
CopyAcceleratorTableW
CharNextExA
GetSystemMenu
LoadBitmapW
GetCursorPos
SetWindowLongA
GetForegroundWindow
DdeGetQualityOfService
CheckMenuItem
GetThreadDesktop
WindowFromDC
InSendMessage
ImpersonateDdeClientWindow
EnumDisplayMonitors
MessageBoxIndirectW
CreateIconIndirect
GetWindowDC
SetWindowsHookW
UnloadKeyboardLayout
TrackPopupMenuEx
GetTaskmanWindow
InflateRect
UnhookWindowsHook
GetMouseMovePointsEx
GetCapture
LoadCursorFromFileA
SwitchDesktop
EnumChildWindows
GetKeyState
GetUpdateRgn
DdeNameService
UnregisterDeviceNotification
UnregisterUserApiHook
GetWinStationInfo
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
AccessCheck
EqualSid
CheckTokenMembership
FreeSid
LookupAccountSidW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
OpenProcessToken
RegOpenKeyExW
RegDeleteKeyW
CopySid
GetLengthSid
IsValidSid
DuplicateToken
CreatePropertySheetPageW
ImageList_Create
ImageList_ReplaceIcon
DestroyPropertySheetPage
ShellExecuteW
NetApiBufferFree
NetLocalGroupGetMembers
NetLocalGroupDelMembers
NetLocalGroupAddMembers
UpdateUrlCacheContentPath
FtpDeleteFileW
InternetWriteFileExA
InternetSetOptionA
GopherGetLocatorTypeW
GopherGetAttributeW
InternetShowSecurityInfoByURL
FtpDeleteFileA
InternetCheckConnectionW
InternetConfirmZoneCrossing
InternetGetConnectedStateEx
FtpRemoveDirectoryW
ParseX509EncodedCertificateForListBoxEntry
InternetShowSecurityInfoByURLA
InternetGetCookieW
InternetCloseHandle
InternetSetCookieW
InternetGoOnlineA
UnlockUrlCacheEntryFileA
FtpGetCurrentDirectoryW
CreateUrlCacheEntryW
InternetTimeToSystemTimeA
DetectAutoProxyUrl
CreateUrlCacheGroup
FindNextUrlCacheEntryW
ShowX509EncodedCertificate
InternetCombineUrlW
InternetAlgIdToStringW
FtpRenameFileW
InternetAttemptConnect
InternetSetStatusCallbackA
IsUrlCacheEntryExpiredW
CreateUrlCacheContainerW
InternetSetDialState
InternetAutodialCallback
SetUrlCacheGroupAttributeW
DeleteIE3Cache
GopherGetAttributeA
FindNextUrlCacheContainerW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ