Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_824e1bea8dcf96845fffe7c17904b8ea_bkransomware.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-26_824e1bea8dcf96845fffe7c17904b8ea_bkransomware.exe
Resource
win10v2004-20240226-en
Target
2024-04-26_824e1bea8dcf96845fffe7c17904b8ea_bkransomware
Size
231KB
MD5
824e1bea8dcf96845fffe7c17904b8ea
SHA1
6d5fdf07107e21b852e668487f5e1663a18f0cce
SHA256
1b21c7e7469b9b39b45194e3abb7f7ad55ad27532642540dc6729703fcd2e475
SHA512
c0a0d5e08d3e0cc3754bab13942961aa36b143354a099515f1f0348743b6fea5d2d3a012c3e9bfc6001106272f7f46e98b42b2afffab2cc9a560031ad534f683
SSDEEP
6144:TBzFeqEHxPxAOpsez7/0kbCOTBXY/+IRvqg:TBzFEUOpsI/0keOTJY/npz
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathRemoveFileSpecA
PathAddExtensionA
PathCombineA
PathFileExistsA
PathFindExtensionA
PathRemoveExtensionA
PathAddBackslashA
GetStringTypeW
LoadLibraryExW
FindClose
DeleteFileA
FindFirstFileA
FindNextFileA
RemoveDirectoryA
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
FlushFileBuffers
WideCharToMultiByte
GetDiskFreeSpaceExA
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
WriteConsoleW
OutputDebugStringW
CreateFileW
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
EncodePointer
GetSystemTimeAsFileTime
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
SetEndOfFile
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
CloseHandle
GetStdHandle
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
WriteFile
GetConsoleCP
SetStdHandle
SetFilePointerEx
GetModuleFileNameW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
TranslateMessage
DispatchMessageA
PeekMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ