Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-28_bfed5377cbcbacf29b2d7fe50f948a93_bkransomware_karagany.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-28_bfed5377cbcbacf29b2d7fe50f948a93_bkransomware_karagany.exe
Resource
win10v2004-20240508-en
Target
2024-06-28_bfed5377cbcbacf29b2d7fe50f948a93_bkransomware_karagany
Size
908KB
MD5
bfed5377cbcbacf29b2d7fe50f948a93
SHA1
e91e891d13c4291201c5bbae74d4e23b4bb84ae9
SHA256
f4b9f68353347efd3be9e1d4187626ee234ae37c1823f579c057513c6942dde7
SHA512
d9fd1f86a78747988acf025df3961342dc6838d22b2df3a4ca3fffbe434ef7d79478dda1a6c3db8b09b6c1efbd1ce8fafdcbc709b856e826e8f6fabf879e4b25
SSDEEP
24576:uXomBs1WhjKcohDdd00pC0IKfulkBWeQGX6sD:C74seWoAKfulkBWeQTQ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
mi_exe_stub.pdb
GetCommandLineA
GetLastError
SetLastError
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
IsDebuggerPresent
IsProcessorFeaturePresent
LoadLibraryExW
RtlUnwind
OutputDebugStringW
HeapAlloc
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
ReadFile
SetFilePointer
CreateFileMappingW
GetTempFileNameW
FindResourceExW
FindResourceW
LoadResource
VerSetConditionMask
CreateDirectoryW
CopyFileW
SizeofResource
FormatMessageW
HeapDestroy
GetTempPathW
RaiseException
VerifyVersionInfoW
LockResource
RemoveDirectoryW
lstrcmpiW
DeleteFileW
LocalFree
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
MapViewOfFile
UnmapViewOfFile
VirtualQuery
PathAppendW
PathQuoteSpacesW
CoInitializeEx
CoUninitialize
SHGetFolderPathW
ord680
CharNextA
wvsprintfW
MessageBoxW
CharLowerBuffW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ