Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_e1ac6fae0de24a57cc4d6401021f6f49_bkransomware.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-26_e1ac6fae0de24a57cc4d6401021f6f49_bkransomware.exe
Resource
win10v2004-20240226-en
Target
2024-04-26_e1ac6fae0de24a57cc4d6401021f6f49_bkransomware
Size
340KB
MD5
e1ac6fae0de24a57cc4d6401021f6f49
SHA1
16bcaa5e2e478cefcdda71da2a7c4716fb642072
SHA256
3855a111c237a08a6bcf2b522a57bb2b15e9e62e6f276fae8df348b45c8f0fcf
SHA512
d358452128b53c15133124be0aa365c7cb121657e024cb3f491f7c365bde4e9f710d59dc6dbf0a5186d1f4976df951fbe2892ec1f24e730855fdbc48be47ade1
SSDEEP
6144:B9RV0eJK1W1C9NKtQC80VAIhVixl0o5v:tRC9NKtQC80VThVixL
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Projects\SOM\Install\Windows\StartScreenRecorder\Release\StartScreenRecorder.pdb
SetConsoleTitleW
GetFileTime
CloseHandle
DeleteFileW
LocalFree
CreateThread
SetEndOfFile
GetTimeZoneInformation
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
SetEnvironmentVariableA
WriteConsoleW
GetConsoleScreenBufferInfo
GetLastError
GetStdHandle
GetStringTypeW
GetTempPathW
CreateFileW
LCMapStringW
CompareStringW
HeapSize
OutputDebugStringW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
FlushFileBuffers
RaiseException
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
RtlUnwind
FreeEnvironmentStringsW
GetModuleFileNameW
GetExitCodeProcess
FormatMessageW
WriteFile
SetConsoleScreenBufferSize
WaitForSingleObject
CreateProcessW
AllocConsole
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetTempFileNameW
GetModuleFileNameA
SetLastError
FormatMessageA
GetProcAddress
GetTickCount64
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
SleepEx
VerSetConditionMask
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
MultiByteToWideChar
WideCharToMultiByte
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
SetStdHandle
GetFileType
GetCommandLineA
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
ReadFile
GetCurrentThreadId
ExitThread
LoadLibraryExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
EndDialog
MessageBoxA
MessageBoxW
DialogBoxParamW
PostMessageW
GetClientRect
CreateWindowExW
SetWindowTextW
SendMessageW
CryptReleaseContext
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
RegCloseKey
CryptGenRandom
RegOpenKeyExW
CryptAcquireContextA
ShellExecuteA
InitCommonControlsEx
bind
send
recv
ioctlsocket
closesocket
__WSAFDIsSet
socket
WSAGetLastError
WSACleanup
WSAStartup
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
getaddrinfo
select
freeaddrinfo
WSASetLastError
CertFreeCertificateContext
IdnToAscii
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ