Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_b490e7078d3888e0515fe205b1dfd6b0_bkransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-05_b490e7078d3888e0515fe205b1dfd6b0_bkransomware.exe
Resource
win10v2004-20240508-en
Target
2024-06-05_b490e7078d3888e0515fe205b1dfd6b0_bkransomware
Size
5.8MB
MD5
b490e7078d3888e0515fe205b1dfd6b0
SHA1
d99d1b45e5f7bbb63a867a797306204c26304684
SHA256
b9bd37953ebd8381e887a75b3d461ff20f7c268f3fb0c7469de8a8c02687a07f
SHA512
c472ab55f8bbe8d55a0a6a083c9c79bd52ae6c49be626e5e0ce1df591dcd57dac1b150eee2a3be0280d9b67443434a318fae5f06bc0f48a2069c312329196ee4
SSDEEP
98304:uoEkQ8utBOFzgeX4GbJ9tgf1qOCp10kOFajQFRDEHeow60aRE9wNV4b0KPDZJ0+B:93QZkFfXb7HnVODRQ+ow78rVKPDZO+S0
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
WriteFile
OpenProcess
GetTickCount
RaiseException
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
GetProcAddress
DecodePointer
DeleteFileA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LoadLibraryA
RemoveDirectoryA
GetEnvironmentVariableA
LocalAlloc
LocalFree
lstrlenA
GetNativeSystemInfo
SetLastError
SizeofResource
CreateFileW
OutputDebugStringW
WriteConsoleW
SetStdHandle
LCMapStringW
SetFilePointerEx
ReadConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
GetFileType
GetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LockResource
LoadResource
FindResourceA
FindClose
FindNextFileA
GetModuleFileNameA
FindFirstFileA
CloseHandle
CreateThread
GetCurrentThreadId
GetModuleHandleA
SetEndOfFile
Sleep
AreFileApisANSI
GetModuleHandleExW
ExitProcess
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
VirtualFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetCommandLineA
LoadLibraryExW
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
MultiByteToWideChar
lstrcatA
WideCharToMultiByte
FindResourceW
FindResourceExW
ReadFile
IsBadReadPtr
FreeLibrary
VirtualProtect
VirtualAlloc
GetWindowRect
ReleaseDC
ScreenToClient
MoveWindow
GetDlgItem
EnableWindow
LoadImageA
GetDC
GetMessageA
MessageBoxA
WaitMessage
CreateDialogParamA
IsWindow
PostMessageA
DispatchMessageA
DestroyWindow
PeekMessageA
SendMessageA
wsprintfA
ShowWindow
AttachThreadInput
GetSystemMetrics
EnumWindows
GetClassNameA
GetWindowTextA
SetTimer
UpdateWindow
PostQuitMessage
SetWindowTextA
GetDeviceCaps
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemFree
PathFindFileNameA
HttpOpenRequestA
InternetQueryOptionA
InternetCloseHandle
InternetOpenA
InternetConnectA
InternetCrackUrlA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
WTSFreeMemory
WTSEnumerateProcessesA
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ