Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-10_fc679ba37d6c5974e0cddf0dde54c34a_bkransomware_virut.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-10_fc679ba37d6c5974e0cddf0dde54c34a_bkransomware_virut.exe
Resource
win10v2004-20240802-en
Target
2024-08-10_fc679ba37d6c5974e0cddf0dde54c34a_bkransomware_virut
Size
3.1MB
MD5
fc679ba37d6c5974e0cddf0dde54c34a
SHA1
10847dd19b40c75448c29dcf2bdc1f7465262a81
SHA256
70b960c4cc449822ef9d1cc43bf9a68fa01147500734db30aba1a07c1b190623
SHA512
d235f5001aaf4a151c7e280742af60dc1337ddf0ec235bfaab0ded8daf2a7650f4270a0479f73326c7545387bb05d80b61c08df9102c32b3932b1e1445875e20
SSDEEP
6144:AExmSSgxZ0YQEbbStvn7yWDTcvPpSDZs8mrnmNtFf0ykPke7lY/FaWB3IZ7nLKo+:AEpZxpQIbSp7ycUpULmrnotDk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\Baickl\Work\Projects\DingTalk\CrashDumper\symbol\win32\Release\CrashDumper.pdb
GetCurrentThreadId
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForSingleObject
Sleep
LoadResource
SizeofResource
CloseHandle
lstrcmpiW
CreateEventA
OpenEventW
LoadLibraryExW
GetEnvironmentVariableA
FindResourceW
FindResourceExW
MultiByteToWideChar
GetFileAttributesExW
GetFileSize
ReadFile
UnmapViewOfFile
CreateFileMappingW
CreateFileW
MapViewOfFileEx
GetTickCount
WideCharToMultiByte
OpenProcess
WriteFile
LoadLibraryW
GetSystemDirectoryW
GetTempPathW
DeleteFileW
CopyFileW
TerminateProcess
CreateProcessW
GetCommandLineW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetSystemDefaultLCID
lstrcpynW
lstrcpyW
lstrlenW
LoadLibraryA
GlobalMemoryStatusEx
GetSystemTimes
GetVersionExW
FindClose
FindFirstFileW
FindNextFileW
RaiseException
GetFileType
SetFilePointer
GetFileTime
FreeLibrary
GetLocalTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToDosDateTime
MapViewOfFile
GetFileAttributesW
WriteConsoleW
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetEnvironmentVariableA
RtlUnwind
GetModuleHandleExW
ExitProcess
EncodePointer
GetCurrentProcess
FlushInstructionCache
GetFileInformationByHandle
GetProcAddress
LockResource
InterlockedDecrement
InterlockedIncrement
DecodePointer
GetModuleHandleW
GetModuleFileNameW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
DuplicateHandle
HeapDestroy
MapWindowPoints
GetWindowLongW
GetParent
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
TranslateMessage
DispatchMessageW
PeekMessageW
DefWindowProcW
PostQuitMessage
UnregisterClassW
DestroyWindow
ShowWindow
CreateDialogParamW
CharNextW
SetWindowLongW
SendMessageW
IsWindow
DialogBoxParamW
GetDlgItem
GetMessageW
EndDialog
SetWindowPos
GetWindow
EnableWindow
GetGuiResources
SetActiveWindow
ReleaseCapture
SetCapture
UpdateWindow
IsDialogMessageW
LoadIconW
GetWindowTextW
SetFocus
IsDlgButtonChecked
CheckDlgButton
SetDlgItemTextW
MessageBoxW
GetDesktopWindow
GetWindowTextLengthW
SetWindowTextW
GetActiveWindow
CreateFontW
GetStockObject
RegOpenKeyExW
RegEnumValueW
RegSetValueExA
RegSetValueExW
RegQueryInfoKeyW
RegCloseKey
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
SHGetFolderPathW
ExtractIconExW
SHFileOperationW
SHCreateDirectoryExW
CoCreateInstance
CoUninitialize
CoCreateGuid
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
VarUI4FromStr
PathRemoveExtensionW
PathStripPathW
PathAppendW
PathFileExistsW
PathRemoveBackslashW
PathRemoveFileSpecW
PathCanonicalizeW
PathIsRelativeW
PathAddBackslashW
PathFindExtensionW
InitCommonControlsEx
MiniDumpWriteDump
InternetCrackUrlW
InternetOpenW
InternetCloseHandle
InternetConnectW
HttpSendRequestW
InternetOpenA
InternetErrorDlg
HttpEndRequestW
HttpSendRequestExW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetReadFile
InternetWriteFile
ObtainUserAgentString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE