Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-31_7167c9bb3f6ddda19e7fda58ba4f0b86_bkransomware_karagany.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-31_7167c9bb3f6ddda19e7fda58ba4f0b86_bkransomware_karagany.exe
Resource
win10v2004-20240426-en
Target
2024-05-31_7167c9bb3f6ddda19e7fda58ba4f0b86_bkransomware_karagany
Size
8.4MB
MD5
7167c9bb3f6ddda19e7fda58ba4f0b86
SHA1
f015f632c0c0cabce566816337d803db791fdde5
SHA256
ce90e73ada7870c659803d0d63a068acab3a30f96dd361198a7c8d67418f023f
SHA512
0a275f80d529712e2886e735bf6f97f424579de1e5535534b31f11b4c95cc90e6d79f1ad70c8df986ca2a2635a43182ef35a44313d5f12302e17a09242b46788
SSDEEP
196608:+9K8vzQTC0aW2vfN+V7BapdYjFP05bSkFLOyomFHKnPa:iTQTC0aW23YVApPF7
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\git_code\Custom_new_ui\MTC\new_ui_branch_from_encrypt\windows_new_ui_MTC\Release\MTC-4000.pdb
FindResourceW
SizeofResource
LoadResource
LockResource
SetFileAttributesW
CreateFileW
WriteFile
CloseHandle
GetDriveTypeW
CreateMutexW
OpenProcess
SetErrorMode
CreateDirectoryW
DeleteFileW
WaitForSingleObject
Sleep
CopyFileW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetLastError
GetModuleFileNameW
FlushFileBuffers
OutputDebugStringW
GetStringTypeW
LCMapStringW
HeapReAlloc
EncodePointer
DecodePointer
GetCommandLineW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapFree
HeapAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
WriteConsoleW
wsprintfW
FindWindowW
PostMessageW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
CoUninitialize
CoInitializeEx
CoInitialize
CoCreateInstance
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ