Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_ea2416b99034e93951bd0a4a03d1b186_bkransomware.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-29_ea2416b99034e93951bd0a4a03d1b186_bkransomware.exe
Resource
win10v2004-20240611-en
Target
2024-06-29_ea2416b99034e93951bd0a4a03d1b186_bkransomware
Size
8.2MB
MD5
ea2416b99034e93951bd0a4a03d1b186
SHA1
2c321bd8d7e6d1c1cd7ea715f443de9f1b4734b6
SHA256
7d377a253d4a9f305e728b31ba6588d3dc5c6f39bc5b07d3b5dac7124b723b45
SHA512
3fd1bfbb492fe6c8a0463420703354332605c0536f5a633d7039374378347f933de376a3a6f149c99d3aa6c764b5f1e15bcb8492a4c772c37b9e4c879d8300c8
SSDEEP
196608:vouHSSL6/1swK/UBpfpZMDJJtqxO5OG7Em/xyqyM/:vouHp2NsFcjZ2v4sTYm/xsM/
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\workspace\tutor\win\pdb\TutorSetup.pdb
SetFileTime
GetTempPathW
GetSystemDirectoryW
GetWindowsDirectoryW
lstrlenW
MoveFileW
FindClose
FindCloseChangeNotification
FindFirstChangeNotificationW
FindFirstFileW
FindNextFileW
GetLogicalDriveStringsW
GetFileInformationByHandle
GetFileSize
SetEndOfFile
SetFilePointer
CompareFileTime
FileTimeToSystemTime
GetProcAddress
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
GetCurrentThreadId
FlushInstructionCache
GetFileAttributesW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetVersion
GetVersionExW
GetModuleHandleA
GetModuleHandleW
MoveFileExW
VerSetConditionMask
GetTickCount
VerifyVersionInfoW
GetLocalTime
Sleep
GetDiskFreeSpaceExW
GetDriveTypeW
CreateMutexW
lstrcmpiW
FreeResource
GlobalAlloc
GlobalFree
WritePrivateProfileStringW
SetFileAttributesW
RemoveDirectoryW
GetTempFileNameW
GetShortPathNameW
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
FatalAppExitA
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateSemaphoreW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
GetFileType
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetCurrentThread
ExitThread
CreateThread
RtlUnwind
EncodePointer
GetCommandLineW
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetFullPathNameW
DeleteFileW
CreateFileW
CreateDirectoryW
SearchPathW
GetCurrentDirectoryW
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
FreeLibrary
WriteFile
ReadFile
GetStdHandle
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
LocalFree
DecodePointer
BeginPaint
EndPaint
InvalidateRect
GetClientRect
CreateWindowExW
LoadCursorW
DrawEdge
DrawFrameControl
GetMessageW
GetWindow
LoadImageW
MonitorFromWindow
GetMonitorInfoW
CharNextW
wsprintfW
MoveWindow
GetClassInfoExW
RegisterClassExW
CharToOemW
CharUpperW
UnregisterClassW
SetWindowLongW
GetParent
FrameRect
ChildWindowFromPoint
MapWindowPoints
ScreenToClient
MessageBoxW
RedrawWindow
SetForegroundWindow
SetFocus
PostQuitMessage
SystemParametersInfoW
IsDialogMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
SendMessageW
PostMessageW
PostThreadMessageW
DefWindowProcW
CallWindowProcW
IsWindow
GetWindowRgn
GetWindowLongW
PtInRect
OffsetRect
InflateRect
CopyRect
FillRect
DrawFocusRect
GetSysColor
ClientToScreen
SetCursor
AdjustWindowRectEx
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
GetDC
UpdateWindow
DrawTextW
GetMenu
GetSystemMetrics
IsWindowEnabled
EnableWindow
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetCapture
GetDlgCtrlID
GetDlgItem
CreateDialogParamW
SetWindowPos
ShowWindow
DestroyWindow
CreateSolidBrush
DeleteObject
GetCurrentObject
PtInRegion
SelectObject
SetTextColor
CreateFontIndirectW
CreateRectRgn
CreateFontW
DeleteDC
SetBkMode
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
CreateDIBSection
GetObjectW
CreateBrushIndirect
SetBkColor
GetTextMetricsW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
GetUserNameW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
SHGetSpecialFolderPathW
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ord165
ShellExecuteExW
SHBrowseForFolderW
CoInitializeEx
CoUninitialize
CoCreateGuid
CoInitializeSecurity
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
VariantCopy
SysAllocStringByteLen
VariantInit
VarUI4FromStr
CreateErrorInfo
SysFreeString
VariantClear
GetErrorInfo
VariantChangeType
SetErrorInfo
SysAllocString
GdipFree
GdipCreateBitmapFromStream
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStreamICM
GdipDisposeImage
GdipAlloc
StrStrIW
PathStripPathW
PathIsRootW
StrCmpW
SHSetValueW
SHDeleteKeyW
PathAppendW
ord176
SHGetValueW
PathRemoveFileSpecW
PathRemoveBackslashW
PathCombineW
PathFileExistsW
PathIsPrefixW
ImageList_Destroy
InitCommonControlsEx
ImageList_Add
ImageList_Create
_TrackMouseEvent
ImageList_GetIconSize
ImageList_DrawIndirect
ImageList_Draw
AlphaBlend
GetModuleFileNameExW
EnumProcessModules
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
SetupIterateCabinetW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ