Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_2368d2c1dce37cbfb25e534a961c328c_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-29_2368d2c1dce37cbfb25e534a961c328c_bkransomware.exe
Resource
win10v2004-20240802-en
Target
2024-08-29_2368d2c1dce37cbfb25e534a961c328c_bkransomware
Size
331KB
MD5
2368d2c1dce37cbfb25e534a961c328c
SHA1
0b1f4ba7c99946393cb77350d2a718a26131df05
SHA256
2b1b49f641f6fdf1258d18947d2ff2fdda1c8cc223b4a2e2639a81ebf5bacbd6
SHA512
d2bd060cd03fdbc22db51f7ce0558965eb68ff82a4fdc925c2ae4572f8f769bd0301dfc80610de0c48c91eaec6fe4ab05bc9c40761b69b99abdeacbae1b6c8e7
SSDEEP
6144:pmp5IBr4WYcFIgpRL00AIPB72s9UYJ1dMvc:poeuXc3bL00AIPh2s51dMk
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\My\XMiner\EpicScale\Release\EpicScale.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
GetCurrentThreadId
SetThreadPriority
SuspendThread
ResumeThread
GetFileSizeEx
GetFileTime
EncodePointer
GetSystemDirectoryW
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetErrorMode
GlobalFlags
CompareStringW
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
CreateThread
ExitThread
SetStdHandle
GetFileType
HeapQueryInformation
GetStdHandle
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
TerminateProcess
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetOEMCP
GetCPInfo
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
WriteConsoleW
LCMapStringW
GetStringTypeW
SetEnvironmentVariableA
MoveFileW
DuplicateHandle
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
CreateFileW
FormatMessageW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
GetACP
WideCharToMultiByte
GetTempPathW
SetUnhandledExceptionFilter
DecodePointer
HeapSize
RaiseException
InitializeCriticalSectionEx
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
CopyFileW
CreateDirectoryW
TerminateThread
WaitForMultipleObjects
CreateEventA
FreeLibrary
GetCommandLineW
SetLastError
GetConsoleWindow
GetLocalTime
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
GetDiskFreeSpaceW
GetModuleHandleW
GetFileAttributesExW
DeleteFileW
GetFileAttributesW
CreateEventW
ReleaseMutex
CreateMutexA
SetEvent
MultiByteToWideChar
Sleep
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpA
lstrcpyW
LocalFree
LocalAlloc
lstrcpynW
FindResourceW
LoadResource
LockResource
SizeofResource
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
LoadLibraryA
VirtualProtect
WriteProcessMemory
lstrcmpiA
VirtualQuery
GetProcAddress
OutputDebugStringW
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleA
Module32NextW
Module32FirstW
GetLastError
GetCurrentProcess
CreateToolhelp32Snapshot
CloseHandle
ClientToScreen
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
LoadCursorW
GetSysColorBrush
ReleaseDC
GetDC
SetWindowTextW
IsWindowEnabled
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
UnhookWindowsHookEx
GetLastActivePopup
GetTopWindow
RealChildWindowFromPoint
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
GetClientRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
DestroyMenu
EnableWindow
GetCapture
GetDlgCtrlID
SetWindowPos
DestroyWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
PostQuitMessage
GetClassNameW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
GetWindow
GetWindowLongW
GetWindowTextW
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
IsWindowVisible
GetMessageW
GetDesktopWindow
GetSystemMetrics
CharUpperW
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetParent
DialogBoxParamW
UnregisterClassW
UpdateWindow
DispatchMessageW
TranslateMessage
PeekMessageW
GetDlgItem
CreateDialogParamW
ShowWindow
SendMessageW
MessageBoxW
EndDialog
SetDlgItemTextW
PostMessageW
IsWindow
FindWindowW
RegisterWindowMessageW
GetFocus
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtTextOutW
TextOutW
SetBkColor
GetDeviceCaps
SetMapMode
SelectObject
SaveDC
RestoreDC
RectVisible
PtVisible
GetStockObject
GetClipBox
Escape
DeleteObject
DeleteDC
CreateBitmap
SetTextColor
DocumentPropertiesW
ClosePrinter
OpenPrinterW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyW
RegCreateKeyExW
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
PathIsUNCW
PathStripToRootW
PathFindFileNameW
UrlUnescapeW
PathFindExtensionW
CoCreateInstance
CoUninitialize
CoInitialize
VariantInit
VariantClear
VariantChangeType
ImageDirectoryEntryToData
CryptDecodeObject
CertGetNameStringW
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertFindCertificateInStore
CryptQueryObject
CryptMsgGetParam
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetErrorDlg
InternetSetStatusCallbackW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetSetFilePointer
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoW
LresultFromObject
CreateStdAccessibleObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ