Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_bd91bb95fa825dd2e194356fd705bba2_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-06_bd91bb95fa825dd2e194356fd705bba2_bkransomware.exe
Resource
win10v2004-20240704-en
Target
2024-07-06_bd91bb95fa825dd2e194356fd705bba2_bkransomware
Size
301KB
MD5
bd91bb95fa825dd2e194356fd705bba2
SHA1
10226f48259fb2f0105dae68cc3b6e12ee48fd88
SHA256
9539f4d841ec5ff034a7adc1fe79b319c1231f402bfddd05ad79c7c8d75d2b3f
SHA512
2bbce3577f8433d20f775c334e08081334f4e71cae96283310e28523fff26e3a48dad2823bee3c4aefab3ad3f8fbbc1867f7da783ece68590072a6fac1037f5a
SSDEEP
6144:0r9gUODMW8XtJu66m75aHHEgXIL/1UahAnk:1LMW8XtTF5aHHnw/Sk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
WaitForSingleObject
CloseHandle
lstrcmpiA
lstrcpynA
lstrlenA
CreateMutexA
GetDriveTypeA
CreateFileA
GetVolumeInformationA
GetVersion
GetFileType
ReadFile
FindClose
GetFileTime
FileTimeToLocalFileTime
GetLastError
GetFullPathNameA
GetFullPathNameW
CreateFileW
SetFileAttributesA
SetFileAttributesW
GetFileAttributesA
GetFileAttributesW
FindFirstFileA
GetVolumeInformationW
MultiByteToWideChar
WideCharToMultiByte
GetConsoleMode
SetConsoleMode
FindFirstFileW
FindNextFileA
FindNextFileW
SetEnvironmentVariableW
DeleteFileW
GetFileAttributesExW
GetCurrentProcess
GetProcessHeap
HeapFree
HeapAlloc
FileTimeToSystemTime
InterlockedExchange
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
AreFileApisANSI
GetCPInfo
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
DuplicateHandle
CreateProcessA
SetConsoleCtrlHandler
HeapReAlloc
GetModuleHandleW
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetFileInformationByHandle
PeekNamedPipe
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
GetCommandLineA
SetLastError
GetCurrentThreadId
FlushFileBuffers
WriteFile
GetConsoleCP
DeleteCriticalSection
GetStdHandle
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentDirectoryW
MoveFileExW
IsValidCodePage
GetACP
GetOEMCP
GetModuleFileNameW
RtlUnwind
ReadConsoleW
GetTimeZoneInformation
LoadLibraryExW
GetExitCodeProcess
CreatePipe
SetEndOfFile
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
OutputDebugStringW
SetEnvironmentVariableA
HeapSize
RemoveDirectoryW
CharToOemA
OemToCharA
GetSecurityDescriptorLength
AdjustTokenPrivileges
OpenProcessToken
GetKernelObjectSecurity
LookupPrivilegeValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ