Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_501a8b8cb12a53f099989002082b90d4_bkransomware.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-02_501a8b8cb12a53f099989002082b90d4_bkransomware.exe
Resource
win10v2004-20240426-en
Target
2024-06-02_501a8b8cb12a53f099989002082b90d4_bkransomware
Size
794KB
MD5
501a8b8cb12a53f099989002082b90d4
SHA1
cf5852226d19f1dc70b13c70993bdccad83376eb
SHA256
6919f0a15d7619ea09052cdd0dd0664241effd5387c241c38528ad38753b530e
SHA512
60498b638ee4774f599c082bec3778d64f58fc6ac66d5187e5f21a88c2c027d5e49160f382ee93cd1ee71295df52915f7b8f7823b0f8f0f252c2e769e4b0aebf
SSDEEP
12288:S7oa3U+TspmGmE6kumdjD0b5zS8XMAb+KnblenuB3+fPbRtgs:S7oKAHcb+0b5SSNN3+fVl
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\source\dx_kbdm\dxpyim\build\ime_install.pdb
CloseHandle
LocalFileTimeToFileTime
GetFileSize
FindResourceA
SetPriorityClass
FreeLibrary
LoadResource
GetCurrentProcess
GetCurrentThread
GetWindowsDirectoryA
SetProcessPriorityBoost
OpenProcess
GlobalAlloc
Sleep
SizeofResource
TerminateProcess
GetSystemDirectoryA
GetCurrentDirectoryA
GetEnvironmentVariableA
SetThreadPriority
GetShortPathNameA
GetLastError
GetProcAddress
GlobalFree
LoadLibraryA
LockResource
GetModuleFileNameA
GetModuleHandleA
WinExec
DeleteFileA
lstrcpyA
SetEndOfFile
CreateFileW
FlushFileBuffers
CreateDirectoryA
ReadFile
GetFileAttributesA
WriteFile
SetFileTime
SystemTimeToFileTime
SetFilePointer
lstrcatA
CreateFileA
WriteConsoleW
SetStdHandle
HeapSize
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
HeapReAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetProcessHeap
GetStdHandle
GetModuleFileNameW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LoadLibraryExW
GetFileAttributesExW
DeleteFileW
RtlUnwind
GetConsoleCP
GetConsoleMode
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
OutputDebugStringW
GetStringTypeW
LCMapStringW
ReadConsoleW
wsprintfA
MessageBoxA
ControlService
OpenSCManagerA
QueryServiceStatusEx
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
OpenServiceA
AdjustTokenPrivileges
SHChangeNotify
ShellExecuteExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ