Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_c985a6118494566f1a26ce00b0c5473d_bkransomware.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-25_c985a6118494566f1a26ce00b0c5473d_bkransomware.exe
Resource
win10v2004-20240611-en
Target
2024-06-25_c985a6118494566f1a26ce00b0c5473d_bkransomware
Size
604KB
MD5
c985a6118494566f1a26ce00b0c5473d
SHA1
8511c0578538190b1715ebcfe0b7777415cd6bbb
SHA256
410475bd03ada158dfc12ddced4b1a04f4d9c68f26a046f04ac9da1766b48df2
SHA512
31b6dd1d79f0ec755f7d36c7c33e92972b3143854b8be7ab724d41a52abe8da530bc69dcded65010883cc3dc1a7083d2149f2f294f52e3a0ca0aa1a24befe1f6
SSDEEP
12288:h+wuOHuSZ8oe949cYZa/cp6pUyGqjym8BNUhUeYToS3H/2Y:494KYZa/bUyGIFUrPp
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\BuildAgent\work\dffca96b04de5ecb\src\Launcher\Release\Launcher.pdb
IsNetworkAlive
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetProcessImageFileNameW
HttpOpenRequestW
InternetSetOptionW
InternetCloseHandle
InternetReadFile
InternetOpenW
InternetConnectW
HttpSendRequestW
HttpQueryInfoW
CredUIPromptForCredentialsW
ReadConsoleW
GetConsoleMode
SetFilePointerEx
VerSetConditionMask
GetCurrentProcess
GetModuleHandleW
VerifyVersionInfoW
GetLastError
GetProcAddress
GetCurrentThreadId
CloseHandle
CreateThread
GetModuleFileNameW
CreateProcessA
GetModuleFileNameA
LocalFree
GetEnvironmentVariableW
FreeLibrary
GetEnvironmentVariableA
LoadLibraryA
GetFileAttributesA
GetFileAttributesW
GetConsoleCP
OpenProcess
GetTempFileNameW
MoveFileExW
RtlUnwind
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapAlloc
RaiseException
HeapSize
GetStringTypeW
OutputDebugStringW
HeapReAlloc
LoadLibraryW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
SetEndOfFile
Sleep
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCommandLineA
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
IsProcessorFeaturePresent
CreateDirectoryW
ReadFile
HeapFree
DeleteFileW
SetLastError
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateDialogParamW
IsWindowVisible
SetWindowTextW
EndDialog
GetMessageW
ShowWindow
PostThreadMessageW
DispatchMessageW
MessageBoxW
LoadStringW
EnumWindows
TranslateMessage
GetDlgItem
GetWindowThreadProcessId
SetBkColor
SetBkMode
CreateSolidBrush
SetTextColor
CredWriteW
CredFree
CredReadW
RegCreateKeyA
GetNamedSecurityInfoA
RegCloseKey
FreeSid
AllocateAndInitializeSid
RegCreateKeyExA
RegSetValueExA
SetNamedSecurityInfoA
SetEntriesInAclA
SHGetSpecialFolderPathA
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ