Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-19_79d41e803ff07bb5a9cbe4171a4fd09d_bkransomware.exe
Resource
win7-20240508-en
Target
2024-06-19_79d41e803ff07bb5a9cbe4171a4fd09d_bkransomware
Size
5.8MB
MD5
79d41e803ff07bb5a9cbe4171a4fd09d
SHA1
d605267642ebb7cc4cbe44624c5b4ddca80e0b3d
SHA256
38bdd3c94b5c8f7adbd2075ca213b3303b12af96245092ef402606d372b3f8fd
SHA512
13c70cf2a69466248c7eb9f04bfaae187b3db1bbd023a2aaea21a58c3617f30022f8df58adb3615f1c4129f86e81730c7e840a44d6dae817ee7bd0c3243887b6
SSDEEP
98304:vY1/j6oX2Vi367ZGHbekta/Xgj22iZa6fAd5UkYKty6WAf3Gs:Qu6lHbq2riZa6fymkYdlAf3Gs
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
C:\bamboo-build\LAUN-WCC177-JOB1\3rdParty\wix\wix3.10.4-sources\build\ship\x86\burn.pdb
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
CheckTokenMembership
RegCloseKey
RegOpenKeyExW
CreateWellKnownSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
SetNamedSecurityInfoW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownExW
GetUserNameW
DecryptFileW
SetEntriesInAclW
ChangeServiceConfigW
CloseServiceHandle
ControlService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
SetEntriesInAclA
SetSecurityDescriptorGroup
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
QueryServiceConfigW
PeekMessageW
PostMessageW
IsWindow
WaitForInputIdle
MessageBoxW
GetMessageW
MsgWaitForMultipleObjects
PostThreadMessageW
GetMonitorInfoW
MonitorFromPoint
IsDialogMessageW
LoadCursorW
LoadBitmapW
SetWindowLongW
GetWindowLongW
GetCursorPos
CreateWindowExW
UnregisterClassW
RegisterClassW
DefWindowProcW
DispatchMessageW
TranslateMessage
PostQuitMessage
SysFreeString
SysAllocString
VariantInit
VariantClear
StretchBlt
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
GetObjectW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
CoUninitialize
CoInitializeEx
CoInitialize
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoInitializeSecurity
CLSIDFromProgID
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStartupInfoW
GetFileType
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
LoadLibraryExW
GetStdHandle
DecodePointer
EncodePointer
SetLastError
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineW
SystemTimeToFileTime
CloseHandle
CreateFileW
GetProcAddress
LocalFree
HeapSetInformation
GetLastError
GetModuleHandleW
FormatMessageW
lstrlenA
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
Sleep
GetLocalTime
GetModuleFileNameW
RtlUnwind
GetTempPathW
GetTempFileNameW
CreateDirectoryW
GetFullPathNameW
CompareStringW
GetCurrentProcess
GetVersionExW
GetCurrentProcessId
WriteFile
SetFilePointer
LoadLibraryW
GetSystemDirectoryW
CreateFileA
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
FindClose
SetCurrentDirectoryW
GetCurrentDirectoryW
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
MoveFileExW
FreeLibrary
GlobalAlloc
GlobalFree
GetFileSizeEx
ReadFile
SetFilePointerEx
SetFileTime
CopyFileW
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
ReleaseMutex
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateProcessW
VerSetConditionMask
EnterCriticalSection
LeaveCriticalSection
GetSystemTime
GetNativeSystemInfo
GetModuleHandleExW
GetWindowsDirectoryW
GetSystemWow64DirectoryW
GetComputerNameW
VerifyVersionInfoW
GetVolumePathNameW
GetDateFormatW
GetSystemDefaultLangID
GetUserDefaultLangID
GetStringTypeW
DuplicateHandle
InterlockedExchange
InterlockedCompareExchange
CreateEventW
ProcessIdToSessionId
OpenProcess
GetProcessId
WaitForSingleObject
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CreateThread
GetExitCodeThread
SetEvent
WaitForMultipleObjects
InterlockedIncrement
InterlockedDecrement
ResetEvent
SetEndOfFile
LocalFileTimeToFileTime
DosDateTimeToFileTime
CompareStringA
GetExitCodeProcess
SetThreadExecutionState
CopyFileExW
MapViewOfFile
UnmapViewOfFile
CreateMutexW
CreateFileMappingW
GetThreadLocale
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
VirtualFree
VirtualAlloc
GetModuleHandleA
ExitProcess
LoadLibraryExA
RaiseException
FlushFileBuffers
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ