Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_fdf21047bc6bcfa23321adab723337d6_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-07_fdf21047bc6bcfa23321adab723337d6_bkransomware.exe
Resource
win10v2004-20240419-en
Target
2024-05-07_fdf21047bc6bcfa23321adab723337d6_bkransomware
Size
2.8MB
MD5
fdf21047bc6bcfa23321adab723337d6
SHA1
c6f1fdc06c2c42b45c62a19317af700b58891005
SHA256
1e9ee1d88b001b49c8e365017a6dee3750f4aaf7cb01c400889c33f96c7a2ea4
SHA512
5d6af0a050fe970660628387d23d153680070728033f67a4df87756c27901b922a97a54c7a114399d8dda298d877bda887ade8667b809b15f7478407cbd91b40
SSDEEP
49152:CCEW2i8Sno59DUjAbDiYFpIyzQR9sXafgkDFMVR9C1UhPJXMK701hOHZbebbVjEi:CCFiiE9g8FphzrBiCV2HD
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
I:\build\trunk3.0_en\downloader\bin\ldplayerinst.pdb
HeapDestroy
HeapReAlloc
HeapSize
SetLastError
GetLogicalDriveStringsW
GetDriveTypeW
DeviceIoControl
GetDiskFreeSpaceExW
GetVolumeInformationW
DuplicateHandle
CreateDirectoryW
GetFileAttributesExW
FindFirstFileExW
InitializeCriticalSectionAndSpinCount
RaiseException
WritePrivateProfileStringA
WritePrivateProfileStringW
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceW
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetLocalTime
CreateMutexW
GetVersionExW
WideCharToMultiByte
SetEndOfFile
WriteConsoleW
MultiByteToWideChar
LoadLibraryW
GetWindowsDirectoryW
K32GetModuleFileNameExW
K32EnumProcessModules
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetStartupInfoW
Sleep
DecodePointer
GetModuleHandleW
TerminateProcess
OpenProcess
CreateProcessW
GetStdHandle
GetExitCodeProcess
SetFilePointer
WriteFile
ReadFile
GetModuleFileNameW
FindClose
DeleteFileW
FindNextFileW
FindFirstFileW
MoveFileExW
SetStdHandle
LCMapStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
GetCPInfo
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineW
IsDebuggerPresent
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
GetProcAddress
FindResourceExW
GetFileSize
GetFileSizeEx
CreateFileW
SetEvent
CloseHandle
TerminateThread
WaitForSingleObject
CreateEventW
GetLastError
GetSystemTimeAsFileTime
GetCurrentThread
GetACP
ExitProcess
MulDiv
GetUserDefaultUILanguage
GetCurrentProcessId
EncodePointer
CreateThread
ExitThread
LoadLibraryExW
RtlUnwind
CreateTimerQueue
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
ShowWindow
GetDC
SetWindowPos
BringWindowToTop
SetForegroundWindow
ReleaseDC
GetWindowLongW
SendMessageW
IsIconic
GetSystemMetrics
KillTimer
SetTimer
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
EnableWindow
wvsprintfW
SetCursor
UnionRect
OffsetRect
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
IsWindow
SetFocus
GetClientRect
GetParent
GetWindow
LoadImageW
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
CreateCaret
HideCaret
ShowCaret
SetCaretPos
ClientToScreen
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
GetGUIThreadInfo
GetPropW
SetPropW
FindWindowExW
RegisterClassW
wsprintfW
SetWindowTextW
PostQuitMessage
CloseWindow
MessageBoxW
DestroyWindow
SetWindowLongW
CreateWindowExW
PostMessageW
DefWindowProcW
GdiFlush
MoveToEx
CreateDIBSection
TextOutW
ExtTextOutW
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectW
DeleteDC
GetDeviceCaps
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CreateSolidBrush
SetBkMode
SetTextColor
CombineRgn
CreatePenIndirect
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
SetStretchBltMode
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
GetTextExtentPoint32W
RegCloseKey
OpenProcessToken
DuplicateTokenEx
RegQueryValueExW
RegCreateKeyW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
SHGetMalloc
ord165
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
PathFileExistsW
PathIsRootW
StrStrIW
StrStrIA
gethostbyname
socket
setsockopt
connect
inet_addr
ntohs
WSAStartup
send
recv
shutdown
closesocket
HttpSendRequestW
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
HttpSendRequestExW
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetCloseHandle
GetAdaptersInfo
_TrackMouseEvent
ord17
ImmGetContext
ImmReleaseContext
ImmSetCompositionFontW
ImmSetCompositionWindow
ImmGetVirtualKey
SysFreeString
VariantInit
VariantClear
SysAllocString
GdiplusStartup
GdiplusShutdown
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipCloneImage
GdipDisposeImage
GdipFree
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipAlloc
GdipGetImageGraphicsContext
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ