Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-08_e88b5209863e0cb7032d2bfcf16d146c_bkransomware_revil.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-08_e88b5209863e0cb7032d2bfcf16d146c_bkransomware_revil.exe
Resource
win10v2004-20240419-en
Target
2024-05-08_e88b5209863e0cb7032d2bfcf16d146c_bkransomware_revil
Size
8.7MB
MD5
e88b5209863e0cb7032d2bfcf16d146c
SHA1
36b86ae08897018e7fc8f81f408d4d1106be54d7
SHA256
cf4ee5a132fa48884bedfa80492b3e3b38dc296ba6c05a55ea4bf89a4b984b41
SHA512
21a0bc251c95bfad479bd843443e4bbf99731091dc5d4c18747a12a5c62abb8c2a1600a14ce13e72b09b09234809dad59f8b8196b835022c480bdfe616988d22
SSDEEP
196608:Qahyk1guc1CPwDv3uFR0ZOagyBDf+fUpC7nk1guc1CPwDv3uFR0ZOagyBDf+Nl:Qlbuc1CPwDv3uFmTgyBDfc2C7nbuc1Cx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\projects\libs\fv.pdb
PeekMessageA
PostMessageA
GetWindowTextA
GetWindowTextLengthA
EnumWindows
GetWindowThreadProcessId
DispatchMessageA
wsprintfA
UnregisterClassA
LoadStringA
MessageBoxA
TranslateMessage
GetLocalTime
GetVersionExA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
FormatMessageA
CreateFileA
GetDriveTypeA
GetFileSize
SetFilePointer
WriteFile
CloseHandle
SetLastError
SetErrorMode
GetCurrentProcess
GetCurrentProcessId
GetTickCount
GetProcessAffinityMask
SetProcessAffinityMask
LoadLibraryA
GetComputerNameA
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
MultiByteToWideChar
WideCharToMultiByte
LockFileEx
UnlockFileEx
TryEnterCriticalSection
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
Sleep
IsBadWritePtr
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
GetTimeZoneInformation
DuplicateHandle
SetThreadPriority
ResumeThread
GetThreadTimes
CreateFileW
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
GetTempPathA
GetTempFileNameA
GetConsoleWindow
LoadResource
LockResource
SizeofResource
FindResourceA
SetEnvironmentVariableA
EnterCriticalSection
GetFullPathNameA
GetFullPathNameW
GetComputerNameExA
TerminateProcess
GetExitCodeProcess
CreateProcessA
OpenProcess
GetPrivateProfileStringA
TlsFree
GetPrivateProfileSectionA
SetStdHandle
FillConsoleOutputAttribute
SetConsoleTextAttribute
ReadConsoleInputA
SetConsoleMode
LocalFree
CreateDirectoryA
CreateDirectoryW
DeleteFileW
FindNextFileA
MoveFileExW
VirtualQuery
lstrlenA
IsBadReadPtr
IsBadCodePtr
GetDateFormatA
GetTimeFormatA
GetUserDefaultLCID
ReleaseMutex
CreateMutexA
lstrlenW
MapViewOfFileEx
UnmapViewOfFile
CreateFileMappingA
FlushFileBuffers
CreateThread
ExitThread
SetPriorityClass
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapValidate
HeapFree
HeapAlloc
Beep
MoveFileExA
CopyFileExA
CopyFileA
SleepEx
GetLastError
SetFileTime
SetFileAttributesA
RemoveDirectoryA
GetFileAttributesA
FindFirstFileA
FindClose
DeleteFileA
GetCurrentDirectoryA
GetEnvironmentVariableA
GetCommandLineA
GetStdHandle
WritePrivateProfileStringA
LeaveCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
RtlUnwind
GetModuleHandleExW
ExitProcess
AreFileApisANSI
GetSystemTimeAsFileTime
LoadLibraryExW
GetDriveTypeW
GetConsoleMode
HeapReAlloc
GetFileType
GetModuleFileNameW
WriteConsoleW
GetModuleHandleW
ReadConsoleW
GetConsoleCP
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
IsProcessorFeaturePresent
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
HeapSize
IsDebuggerPresent
IsValidCodePage
GetACP
GetOEMCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCurrentDirectoryW
OutputDebugStringW
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
accept
bind
closesocket
connect
ioctlsocket
getpeername
htons
inet_ntoa
listen
recv
send
shutdown
socket
gethostbyname
gethostname
WSAStartup
WSACleanup
WSAGetLastError
WSACancelBlockingCall
WSAIoctl
OleUninitialize
CoCreateGuid
CoCreateInstance
CLSIDFromProgID
OleInitialize
CoInitializeSecurity
CoInitialize
CoUninitialize
SysFreeString
SysAllocString
SafeArrayDestroy
VariantChangeType
VariantCopy
VariantClear
VariantInit
MapFileAndCheckSumA
CheckSumMappedFile
EqualSid
AddAccessAllowedAce
ConvertSidToStringSidA
GetTokenInformation
RegQueryValueExA
RegOpenKeyExA
RegConnectRegistryA
RegCloseKey
LookupAccountSidA
GetUserNameA
OpenProcessToken
GetAce
GetAclInformation
GetLengthSid
GetSecurityDescriptorControl
GetSecurityDescriptorDacl
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupAccountNameA
RegCreateKeyExA
RegSetValueExA
SetFileSecurityA
GetFileSecurityA
ConvertStringSidToSidA
AdjustTokenPrivileges
AllocateAndInitializeSid
FreeSid
LookupPrivilegeValueA
AddAce
UuidFromStringA
EnumProcesses
GetModuleFileNameExA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ