Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_e00e10c342bab5ab9985945cf7fab189_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_e00e10c342bab5ab9985945cf7fab189_bkransomware.exe
Resource
win10v2004-20240704-en
Target
2024-07-09_e00e10c342bab5ab9985945cf7fab189_bkransomware
Size
604KB
MD5
e00e10c342bab5ab9985945cf7fab189
SHA1
fe9dc5cb36a362b45724f83a3b6649962e3c46d2
SHA256
633b605ac80fd46ec85ab067ef0f07782674f86771fa17a71b8fd52d17b55927
SHA512
a2ded0061406c3df5e4ccc00e3ad826812f80e978a54ff895c73ef91f86eb6e6ac98364705ef02f4098e91cdfc695819213cf64446386fee6a8eaf232beabc76
SSDEEP
12288:aTK+otxoZ8FbfZ2zljAc1ifXbNCm8BNMhUeYToSrDtSF:znbfozljANXbNtUrlw
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\BuildAgent\work\dffca96b04de5ecb\src\Launcher\Release\Launcher.pdb
IsNetworkAlive
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetProcessImageFileNameW
HttpOpenRequestW
InternetSetOptionW
InternetCloseHandle
InternetReadFile
InternetOpenW
InternetConnectW
HttpSendRequestW
HttpQueryInfoW
CredUIPromptForCredentialsW
ReadConsoleW
GetConsoleMode
SetFilePointerEx
VerSetConditionMask
GetCurrentProcess
GetModuleHandleW
VerifyVersionInfoW
GetLastError
GetProcAddress
GetCurrentThreadId
CloseHandle
CreateThread
GetModuleFileNameW
CreateProcessA
GetModuleFileNameA
LocalFree
GetEnvironmentVariableW
FreeLibrary
GetEnvironmentVariableA
LoadLibraryA
GetFileAttributesA
GetFileAttributesW
GetConsoleCP
OpenProcess
GetTempFileNameW
MoveFileExW
RtlUnwind
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapAlloc
RaiseException
HeapSize
GetStringTypeW
OutputDebugStringW
HeapReAlloc
LoadLibraryW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
SetEndOfFile
Sleep
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCommandLineA
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
IsProcessorFeaturePresent
CreateDirectoryW
ReadFile
HeapFree
DeleteFileW
SetLastError
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateDialogParamW
IsWindowVisible
SetWindowTextW
EndDialog
GetMessageW
ShowWindow
PostThreadMessageW
DispatchMessageW
MessageBoxW
LoadStringW
EnumWindows
TranslateMessage
GetDlgItem
GetWindowThreadProcessId
SetBkColor
SetBkMode
CreateSolidBrush
SetTextColor
CredWriteW
CredFree
CredReadW
RegCreateKeyA
GetNamedSecurityInfoA
RegCloseKey
FreeSid
AllocateAndInitializeSid
RegCreateKeyExA
RegSetValueExA
SetNamedSecurityInfoA
SetEntriesInAclA
SHGetSpecialFolderPathA
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ