Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_2439250c47d16c02726271d9b029b201_bkransomware.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-28_2439250c47d16c02726271d9b029b201_bkransomware.exe
Resource
win10v2004-20240426-en
Target
2024-05-28_2439250c47d16c02726271d9b029b201_bkransomware
Size
341KB
MD5
2439250c47d16c02726271d9b029b201
SHA1
0fd4e2554832c32f88da234c9a2c1de07c84be90
SHA256
0fdbc50793c459ea76901e2c9a18b29393fe1dbbf307adc0420f8d833964dba0
SHA512
08f12bf39859c4bc764b99b8a8a5dae2bd26df6dd95f2a1d20833235d86c5d0d3fc9a0223d7bc38f985b88b0c0e97d72591e5308b22e4f3bf69aaa94f7fdb0c9
SSDEEP
3072:vthzGU2Rjws0k7cuSMJ9jO11/NdOnR1mYCuoNnKpOcQCMdoI4kfbAp9pAc/HcruL:69RV0eJK1W1C9NKtQC80VAIhVixV0oZ6
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Projects\SOM\Install\Windows\StartScreenRecorder\Release\StartScreenRecorder.pdb
SetConsoleTitleW
GetFileTime
CloseHandle
DeleteFileW
LocalFree
CreateThread
SetEndOfFile
GetTimeZoneInformation
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
SetEnvironmentVariableA
WriteConsoleW
GetConsoleScreenBufferInfo
GetLastError
GetStdHandle
GetStringTypeW
GetTempPathW
CreateFileW
LCMapStringW
CompareStringW
HeapSize
OutputDebugStringW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
FlushFileBuffers
RaiseException
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
RtlUnwind
FreeEnvironmentStringsW
GetModuleFileNameW
GetExitCodeProcess
FormatMessageW
WriteFile
SetConsoleScreenBufferSize
WaitForSingleObject
CreateProcessW
AllocConsole
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetTempFileNameW
GetModuleFileNameA
SetLastError
FormatMessageA
GetProcAddress
GetTickCount64
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
SleepEx
VerSetConditionMask
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
MultiByteToWideChar
WideCharToMultiByte
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
SetStdHandle
GetFileType
GetCommandLineA
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
ReadFile
GetCurrentThreadId
ExitThread
LoadLibraryExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
EndDialog
MessageBoxA
MessageBoxW
DialogBoxParamW
PostMessageW
GetClientRect
CreateWindowExW
SetWindowTextW
SendMessageW
CryptReleaseContext
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
RegCloseKey
CryptGenRandom
RegOpenKeyExW
CryptAcquireContextA
ShellExecuteA
InitCommonControlsEx
bind
send
recv
ioctlsocket
closesocket
__WSAFDIsSet
socket
WSAGetLastError
WSACleanup
WSAStartup
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
getaddrinfo
select
freeaddrinfo
WSASetLastError
CertFreeCertificateContext
IdnToAscii
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ