Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_709f42ed18db7259702db66837e49800_bkransomware.exe
Resource
win7-20240221-en
Target
2024-05-10_709f42ed18db7259702db66837e49800_bkransomware
Size
3.2MB
MD5
709f42ed18db7259702db66837e49800
SHA1
587ba6be5b8df43e7969414deb39846fba7fd574
SHA256
c5dd8eb7314a4294a88a495d76cc282b082a98c1e31119e3ddf1846ec0141b76
SHA512
4f0c9b252e4a4febdfe7bf7f5a97c55ba02a7a7986e78aa1015f0f9ce9ff3d6b7c34da2470e38383167e5f0cc33c0b6978ca61e08c41fa5eea0fee47f4d3c75c
SSDEEP
49152:PGDeGKP4rlSJxRAyzMqSVsTrJc6WIHs/BBo62cVhAEO2YvRkkf:MnKP4rlSJVzMpVsvWBBo62ChAcYvWkf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetConsoleDisplayMode
SetConsoleCP
Module32FirstW
GetNumberOfConsoleInputEvents
EnumCalendarInfoA
GetCalendarInfoA
CompareStringA
GetVolumePathNameW
GetFullPathNameA
GetSystemWindowsDirectoryW
GetWindowsDirectoryA
OpenFileMappingW
OpenMutexA
SetMailslotInfo
FormatMessageW
PrepareTape
SetHandleInformation
GetThreadContext
SetThreadExecutionState
GetShortPathNameW
CreateToolhelp32Snapshot
VirtualAlloc
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCommandLineA
GetLastError
SetLastError
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
IsDebuggerPresent
IsProcessorFeaturePresent
LoadLibraryExW
RtlUnwind
OutputDebugStringW
HeapAlloc
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
CreateFileW
RegSetValueW
RegSetValueA
RegSetKeySecurity
RegQueryValueExA
RegNotifyChangeKeyValue
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExA
InitializeSecurityDescriptor
AddAuditAccessAce
AddAccessDeniedAce
InitializeAcl
AreAllAccessesGranted
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
FreeSid
RegSetValueExA
ShellExecuteExW
SHGetMalloc
SHGetDesktopFolder
GetClassFile
OleFlushClipboard
CoFreeLibrary
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ