Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_b32e0c1e6af6c6bcc4b921f7d56c8d53_bkransomware_karagany.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_b32e0c1e6af6c6bcc4b921f7d56c8d53_bkransomware_karagany.exe
Resource
win10v2004-20240704-en
Target
2024-07-09_b32e0c1e6af6c6bcc4b921f7d56c8d53_bkransomware_karagany
Size
14.1MB
MD5
b32e0c1e6af6c6bcc4b921f7d56c8d53
SHA1
a9bb5b51dda776bef0056c7df0e7e1dabcbd7ffe
SHA256
644793e42f8510719648b7f049644e0f8d4d85715a6d55500ed6c9af582b589e
SHA512
1eb83cfb2270d97b81efeeee0d20995eed439c9dd898f76052da4524e30dd2e47610113c636443c46d32f8343a80f4052348c3ad3ca34f193801f335d0884d44
SSDEEP
196608:AZso9FNUS/IzF4gfBPDaQFwu4jbgX5PHOKyqRZdJpGoPWnTBxRdzAM7QFO:ksgkS/8F4uwuAY5/OojzrPYTBxR3d
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
wvsprintfA
wsprintfA
MessageBoxA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ShellExecuteA
SHCreateDirectoryExA
SHGetFolderPathA
SetEndOfFile
ReadFile
AreFileApisANSI
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetFilePointerEx
FreeResource
LockResource
HeapAlloc
HeapFree
GetProcessHeap
GetShortPathNameA
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
SetLastError
WaitForSingleObject
LoadResource
SizeofResource
WriteFile
CloseHandle
FormatMessageA
lstrcpyA
lstrcatA
lstrlenA
GetModuleFileNameA
CreateProcessA
GetEnvironmentVariableA
SetEnvironmentVariableA
FindResourceA
GetTempPathA
GetTempFileNameA
GetWindowsDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
QueryDosDeviceA
CreateFileA
DeleteFileA
MoveFileExA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLocalTime
lstrcmpA
GetConsoleMode
GetConsoleCP
GetStringTypeW
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
ReadConsoleW
MultiByteToWideChar
WideCharToMultiByte
RaiseException
RtlUnwind
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapSize
GetCurrentThreadId
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
HeapReAlloc
LCMapStringW
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetProcessImageFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ