Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_52070159671e2719d4e991dd32d337fd_bkransomware.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-05_52070159671e2719d4e991dd32d337fd_bkransomware.exe
Resource
win10v2004-20240226-en
Target
2024-06-05_52070159671e2719d4e991dd32d337fd_bkransomware
Size
5.8MB
MD5
52070159671e2719d4e991dd32d337fd
SHA1
48bf111d3ca81adbc44c8f6d48d62e1ad68f2882
SHA256
b48c19accb28565f6507ac2a716a4cb0b59c19404a62821b220064e37112bbb3
SHA512
e0ff950d4b0e4d0269b0d25afb0206967917afdfa7fad9568d4e2ebf89a71a244f446d48e32e04c27238d34676157a4a7d2df74a1564572916a1a7c6f461ef4d
SSDEEP
98304:5UOLNQ8utBOFzgeX4GbJ9tgf1qOCp10kOFajQFRDEHeow60aRE9wNV4b0KPDZJ0z:ieQZkFfXb7HnVODRQ+ow78rVKPDZO+Sd
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteFile
OpenProcess
GetCurrentProcessId
EnumResourceTypesA
EnumResourceNamesA
GetTickCount
RaiseException
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
GetProcAddress
DecodePointer
DeleteFileA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LoadLibraryA
RemoveDirectoryA
GetEnvironmentVariableA
LocalAlloc
LocalFree
lstrlenA
GetNativeSystemInfo
VirtualAlloc
SetEndOfFile
CreateFileW
OutputDebugStringW
CreateFileA
SetStdHandle
LCMapStringW
SetFilePointerEx
ReadConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameW
GetFileType
GetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
AreFileApisANSI
GetModuleHandleExW
ExitProcess
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleFileNameA
CloseHandle
CreateThread
GetCurrentThreadId
GetModuleHandleA
WriteConsoleW
Sleep
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
VirtualFree
GetCommandLineA
LoadLibraryExW
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
MultiByteToWideChar
lstrcatA
WideCharToMultiByte
FindResourceW
FindResourceExW
ReadFile
IsBadReadPtr
FreeLibrary
VirtualProtect
SetLastError
CreateDialogParamA
WaitMessage
MessageBoxA
IsWindow
GetWindowTextA
GetClassNameA
PostMessageA
AttachThreadInput
DispatchMessageA
ShowWindow
wsprintfA
PeekMessageA
DestroyWindow
EnumWindows
UpdateWindow
GetMessageA
SetTimer
SetWindowTextA
SendMessageA
LoadImageA
EnableWindow
GetDlgItem
MoveWindow
ScreenToClient
GetSystemMetrics
GetWindowRect
ReleaseDC
GetDC
PostQuitMessage
GetDeviceCaps
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoTaskMemFree
CoUninitialize
PathFindFileNameA
InternetCrackUrlA
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetQueryOptionA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
WTSFreeMemory
WTSEnumerateProcessesA
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ