Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-19_54afe41df5608c9f650dcb79c6b45858_bkransomware_karagany.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-19_54afe41df5608c9f650dcb79c6b45858_bkransomware_karagany.exe
Resource
win10v2004-20240611-en
Target
2024-06-19_54afe41df5608c9f650dcb79c6b45858_bkransomware_karagany
Size
936KB
MD5
54afe41df5608c9f650dcb79c6b45858
SHA1
c59d4fea7c39c465cc9385d41c2a118d2f7ad969
SHA256
99a6dd845853b27a3f1a02252df9aab493278677f80706bc1b4ba65f661eb5c7
SHA512
bd28f3e14612bcbb19f5a064f2efd867051bac14146f3c5f617bcc7db62fd6fdf6be7e1936bf13882ca4780bd1a88ec21f0bd42cfec6ee4eb646ff7c7ac0afa5
SSDEEP
12288:F318C/5+HpMbnqLO+aL/gLELDLTLYLOLwLFLWL/LhtqIaVV+XjwscJp1yNtxHwkT:UIWybKYcVOWj89nzk5I3h7N
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\FNP-11.16.2\tier1\flexnet\utils\build\_release-Windows-ipv6.NT4-i686-main\lmutil.exe.pdb
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
IsDebuggerPresent
IsProcessorFeaturePresent
FreeLibrary
LoadLibraryExW
Sleep
OutputDebugStringW
HeapAlloc
HeapReAlloc
GetStringTypeW
HeapSize
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
QueryPerformanceCounter
GetModuleFileNameW
WriteFile
GetModuleFileNameA
GetStartupInfoW
DeleteCriticalSection
GetFileType
GetStdHandle
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
AreFileApisANSI
GetProcAddress
GetModuleHandleExW
ExitProcess
CreateThread
GetEnvironmentStrings
FreeEnvironmentStringsA
GetVersionExA
lstrlenA
GetCommandLineW
GetEnvironmentVariableA
GetEnvironmentVariableW
SetErrorMode
GetVersion
LoadLibraryA
GetWindowsDirectoryA
FormatMessageA
CreateFileA
ReadFile
SetNamedPipeHandleState
SleepEx
WaitNamedPipeA
InitializeCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetLocalTime
GetTimeZoneInformation
SetEvent
ResetEvent
CreateEventA
GetProcessTimes
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
VirtualAlloc
VirtualFree
GetDriveTypeA
GetVolumeInformationA
DeviceIoControl
GetModuleHandleA
LoadLibraryExA
GetSystemDirectoryA
LoadLibraryW
LocalAlloc
LocalFree
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
FileTimeToSystemTime
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
ExitThread
ResumeThread
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
ReadConsoleW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetFullPathNameA
DecodePointer
EncodePointer
GetCurrentThreadId
SetLastError
GetLastError
GetCommandLineA
socket
WSAGetLastError
getsockopt
htonl
send
WSACleanup
select
recv
getaddrinfo
freeaddrinfo
setsockopt
inet_addr
inet_ntoa
WSAStartup
ioctlsocket
connect
closesocket
__WSAFDIsSet
getnameinfo
wsprintfA
DialogBoxIndirectParamA
EndDialog
CreateDialogIndirectParamA
ShowWindow
SendMessageA
GetSystemMetrics
MessageBoxA
GetActiveWindow
GetParent
GetWindowLongA
ScreenToClient
MessageBeep
GetWindowRect
GetClientRect
SetWindowTextA
EnableWindow
GetFocus
SetFocus
GetDlgItemTextW
GetDlgItem
GetDlgItemTextA
SetDlgItemTextA
MoveWindow
Netbios
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
GetUserNameA
GetUserNameW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
StartServiceA
RegEnumKeyExA
RegQueryInfoKeyA
ord17
GetOpenFileNameA
SysFreeString
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SafeArrayUnaccessData
VariantInit
VariantClear
SafeArrayAccessData
SysAllocString
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
DhcpRequestParams
WinVerifyTrust
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringA
CryptQueryObject
CryptMsgGetParam
ord680
PathRemoveBackslashW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ