Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_a57cad45f4fead8e3726bcebdf6fc249_bkransomware_cobalt-strike.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-03_a57cad45f4fead8e3726bcebdf6fc249_bkransomware_cobalt-strike.exe
Resource
win10v2004-20240226-en
Target
2024-05-03_a57cad45f4fead8e3726bcebdf6fc249_bkransomware_cobalt-strike
Size
198KB
MD5
a57cad45f4fead8e3726bcebdf6fc249
SHA1
51b024c6de438ecf790a5e59bf702594038ef132
SHA256
39faad5425411fccca04e65a546b241a0006b0969a74b3df3babbb638c7b6b9f
SHA512
41ebe4b1cd75511fb912e28d67b8b5f5c2142fe72204d6e7b6fbc4be34f687d336c75e1ed8fca511c8b1d2e76dd8cd4e9956ac61828082663f55a5aff11c051d
SSDEEP
3072:o5JiUjabjaUC96krbRY44hPr5EgwvWCCJkcMzyP51Uc7hHe3CC8qCH3Rk8:o5JiUjaPayYL0agwcg1CCzCH3Rl
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcmpA
lstrcmpiA
lstrcpynA
lstrcpyA
lstrcatA
lstrlenA
OpenFile
LoadLibraryA
LoadLibraryW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
ExpandEnvironmentStringsA
GetSystemDirectoryW
GetVersionExA
GetACP
GetOEMCP
MultiByteToWideChar
LockResource
EnterCriticalSection
LeaveCriticalSection
LoadResource
SizeofResource
SetFilePointer
LoadLibraryExW
FindResourceW
IsDBCSLeadByteEx
TerminateThread
InitializeCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
GetSystemInfo
CreateEventA
CreateFileA
FindFirstFileA
IsDBCSLeadByte
GetModuleFileNameA
OutputDebugStringW
GetSystemDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateFileW
FindFirstFileW
FindNextFileA
CloseHandle
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
GetStringTypeW
HeapReAlloc
RtlUnwind
GetCPInfo
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
HeapSize
GetModuleHandleExW
ExitProcess
RaiseException
HeapAlloc
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
WriteConsoleW
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapFree
GetCommandLineA
ExitThread
GetCurrentThreadId
CreateThread
DecodePointer
EncodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
GetFileTime
FindClose
SetEndOfFile
ReadFile
WriteFile
GetFileSize
GetProcAddress
WideCharToMultiByte
GetLastError
GetProcessHeap
HeapCompact
VirtualFree
VirtualAlloc
LocalFree
LocalSize
LocalUnlock
LocalLock
LocalReAlloc
FindNextFileW
LocalAlloc
SetWindowTextW
SetWindowTextA
GetWindowTextA
GetWindowTextW
MessageBoxA
SetWindowLongA
SetWindowLongW
FindWindowA
FindWindowW
LoadStringA
LoadStringW
IsDialogMessageW
IsDialogMessageA
GetMenuStringW
GetMenuStringA
IsWindowUnicode
GetActiveWindow
SendDlgItemMessageW
SetDlgItemTextA
DialogBoxParamW
DialogBoxParamA
CreateDialogParamA
CreateWindowExW
CreateWindowExA
CallWindowProcW
CallWindowProcA
PeekMessageW
PeekMessageA
DispatchMessageW
DispatchMessageA
MsgWaitForMultipleObjects
SetDlgItemInt
TranslateMessage
SystemParametersInfoA
GetWindow
GetParent
GetDesktopWindow
GetWindowLongA
SetRect
ScreenToClient
MessageBoxW
GetWindowRect
GetSystemMetrics
EnableWindow
GetFocus
SetFocus
SendDlgItemMessageA
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
EndDialog
SetWindowPos
ShowWindow
DestroyWindow
PostMessageA
SendMessageA
wsprintfA
CreateDialogParamW
GetSaveFileNameA
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameW
RegSetValueExW
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetMalloc
SHBrowseForFolderA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ