Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_a01a3200a66dfc04614b1c55e93ac0ff_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-04_a01a3200a66dfc04614b1c55e93ac0ff_bkransomware.exe
Resource
win10v2004-20240426-en
Target
2024-06-04_a01a3200a66dfc04614b1c55e93ac0ff_bkransomware
Size
609KB
MD5
a01a3200a66dfc04614b1c55e93ac0ff
SHA1
5b98d87471b119fc3195d6f1ceb3b87811f95da2
SHA256
7358b2e9c896761be5fabdb92e98fb50f4365b78d679c8ef0244a83d7275dbf6
SHA512
ac9cbd52a102b051bef4dc454515ebc7870115d1577c41ed46f966b055803d9b86c26b7098a1b4e75ce9249476bb92ad80afcffcb6a61a8698887a1fbe4bc5ef
SSDEEP
12288:EV0n/toZ8EMwUDNsAcJIlxIj2Tko7YqX8m8BNwhUeYToSG8hfR:YMdDNsFJIl02TdYqfUrLhfR
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\BuildAgent\work\dffca96b04de5ecb\src\Launcher\Release\Launcher.pdb
IsNetworkAlive
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetProcessImageFileNameW
HttpOpenRequestW
InternetSetOptionW
InternetCloseHandle
InternetReadFile
InternetOpenW
InternetConnectW
HttpSendRequestW
HttpQueryInfoW
CredUIPromptForCredentialsW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
VerSetConditionMask
GetCurrentProcess
GetModuleHandleW
VerifyVersionInfoW
GetLastError
GetProcAddress
GetCurrentThreadId
CloseHandle
CreateThread
GetModuleFileNameW
CreateProcessA
GetModuleFileNameA
LocalFree
GetEnvironmentVariableW
FreeLibrary
GetEnvironmentVariableA
LoadLibraryA
GetFileAttributesA
GetFileAttributesW
SetFilePointerEx
OpenProcess
GetTempFileNameW
MoveFileExW
RtlUnwind
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapAlloc
RaiseException
HeapSize
ReadConsoleW
GetStringTypeW
OutputDebugStringW
LoadLibraryW
HeapReAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
Sleep
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCommandLineA
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
IsProcessorFeaturePresent
CreateDirectoryW
ReadFile
HeapFree
DeleteFileW
SetLastError
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateDialogParamW
IsWindowVisible
SetWindowTextW
EndDialog
GetMessageW
ShowWindow
PostThreadMessageW
DispatchMessageW
MessageBoxW
LoadStringW
EnumWindows
TranslateMessage
GetDlgItem
GetWindowThreadProcessId
SetBkColor
SetBkMode
CreateSolidBrush
SetTextColor
CredWriteW
CredFree
CredReadW
RegCreateKeyA
GetNamedSecurityInfoA
RegCloseKey
FreeSid
AllocateAndInitializeSid
RegCreateKeyExA
RegSetValueExA
SetNamedSecurityInfoA
SetEntriesInAclA
SHGetSpecialFolderPathA
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ