Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_28508cfb84bfbf8843e33b8f213c805d_bkransomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-29_28508cfb84bfbf8843e33b8f213c805d_bkransomware.exe
Resource
win10v2004-20240802-en
Target
2024-08-29_28508cfb84bfbf8843e33b8f213c805d_bkransomware
Size
3.1MB
MD5
28508cfb84bfbf8843e33b8f213c805d
SHA1
f00d24dfff7975dd21897a75fa878f7f91d01009
SHA256
66ce47b9a6eabc881ce105c4424e9d2921a6905b66324cc4fea8f9d6214b9dc0
SHA512
81769d321972663021c262baaa7a2498f72d1b1f2f93ef21745bf4625a4639d98340278b220987d2ed28cc2574677cd02f602a7b0252eb89585d4865acd22790
SSDEEP
49152:8rSnaRL4o0rAcArAICAnVeEU0I6+oDD8qTK+6UTbiJw2OmmqL92a5eQhhvVa9w3s:06eL4SgEUN6ZkgK+6obiarZqM6hvKw8
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Jenkins\workspace\PARTNER_TOOLBAR_RELEASE_BUILD\Stub7\releases\7.24.0\Release\ApnSetup.pdb
ord121
ord115
ord17
ord171
ord119
ord116
ord169
ord125
ord70
ord195
ord205
ord137
ord92
ord190
ord88
ord114
ord141
ord118
ord160
ord159
ord32
ord111
ord8
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
GetCurrentThread
GetCurrentThreadId
LoadLibraryExW
GlobalDeleteAtom
lstrcmpW
SetThreadPriority
SuspendThread
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameW
GetVolumeInformationW
LockFile
SetEndOfFile
UnlockFile
DuplicateHandle
LoadLibraryA
GlobalAddAtomW
FreeResource
EncodePointer
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryW
GlobalFindAtomW
GetModuleHandleA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
CompareStringW
GetLocaleInfoW
GetSystemDefaultUILanguage
GlobalFlags
GetFileAttributesW
GetFileAttributesExW
GetFileSizeEx
SetErrorMode
GetCommandLineW
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
ExitThread
HeapQueryInformation
GetStdHandle
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsValidCodePage
GetOEMCP
GetCPInfo
GetStringTypeW
GetTimeZoneInformation
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LCMapStringW
GetDriveTypeW
SetStdHandle
WriteConsoleW
ReadConsoleW
SetEnvironmentVariableA
OutputDebugStringA
GetACP
Thread32Next
Thread32First
QueryDosDeviceW
GetLogicalDriveStringsW
GetLongPathNameW
ProcessIdToSessionId
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
SetFileAttributesW
SetFileTime
GetBinaryTypeW
Process32NextW
Process32FirstW
GetCurrentProcessId
CreateToolhelp32Snapshot
DeleteCriticalSection
DecodePointer
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTime
GetSystemInfo
IsWow64Process
GetTempPathW
FlushFileBuffers
WideCharToMultiByte
CreateDirectoryW
SetFilePointer
GetNativeSystemInfo
GetTempFileNameW
GetPrivateProfileSectionW
GetCurrentProcess
SetEvent
CreateThread
CreateEventW
LocalAlloc
lstrcmpA
GetVersionExW
GetFileSize
TerminateProcess
lstrlenA
InterlockedDecrement
FreeLibrary
LoadLibraryW
CreateProcessW
LocalFree
GetExitCodeProcess
SetLastError
SetCurrentDirectoryW
GetCurrentDirectoryW
ExpandEnvironmentStringsW
CreateMutexW
OpenMutexW
ReleaseMutex
GetFileTime
ReadFile
WriteFile
CreateFileW
WaitForSingleObject
ResumeThread
MoveFileExW
GetTickCount
DeleteFileW
GetSystemTimeAsFileTime
GetModuleFileNameW
CopyFileW
lstrlenW
FormatMessageW
Sleep
GetUserDefaultUILanguage
GetProcAddress
GetModuleHandleW
FindClose
FindNextFileW
FindFirstFileW
CloseHandle
CompareFileTime
GetProcessTimes
OpenProcess
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
InitializeCriticalSection
GetTopWindow
GetClassNameW
GetClassLongW
PtInRect
MapWindowPoints
AdjustWindowRectEx
RemovePropW
GetPropW
SetPropW
SetForegroundWindow
SetMenu
GetMenu
GetCapture
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
GetMessageTime
GetMessagePos
RegisterWindowMessageW
GetSysColor
ScreenToClient
ClientToScreen
EndPaint
BeginPaint
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
SetActiveWindow
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
DestroyWindow
UnhookWindowsHookEx
SetCursor
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
CharUpperW
CallNextHookEx
SetWindowsHookExW
GetCursorPos
GetKeyState
GetActiveWindow
PeekMessageW
IsDialogMessageW
SetWindowLongW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
GetFocus
SetFocus
GetDlgCtrlID
SetDlgItemTextW
GetDlgItem
MoveWindow
PostQuitMessage
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetParent
SendDlgItemMessageA
FindWindowW
EnumThreadWindows
GetShellWindow
UnregisterClassW
UpdateWindow
InvalidateRect
RedrawWindow
GetWindow
GetWindowDC
MessageBoxW
DefWindowProcW
UnionRect
EnumDisplayMonitors
SetRectEmpty
DispatchMessageW
TranslateMessage
DestroyMenu
GetMessageW
SetLayeredWindowAttributes
KillTimer
SetTimer
RealChildWindowFromPoint
GetLastActivePopup
CreateWindowExW
RegisterClassExW
LoadCursorW
IsRectEmpty
CopyRect
GetWindowRect
ReleaseDC
GetDesktopWindow
GetDC
ShowWindow
GetWindowLongW
GetWindowThreadProcessId
IsWindowEnabled
IsWindowVisible
IsWindow
SetWindowPos
GetForegroundWindow
EnumWindows
EnableWindow
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SendMessageW
LoadIconW
PostMessageW
GetSysColorBrush
GetMonitorInfoW
MonitorFromWindow
ValidateRect
WinHelpW
GetObjectW
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
DeleteObject
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetTextColor
DeleteDC
GetClipBox
Escape
CreateBitmap
GetStockObject
GetDeviceCaps
SetMapMode
SetBkColor
SelectObject
SaveDC
RestoreDC
RectVisible
PtVisible
DocumentPropertiesW
ClosePrinter
OpenPrinterW
RegQueryValueExW
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
DuplicateTokenEx
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
SHGetFolderPathAndSubDirW
SHFileOperationW
ord165
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
InitCommonControlsEx
AssocQueryStringW
PathFindExtensionW
PathIsUNCW
PathStripToRootW
PathFindFileNameW
StrFormatByteSizeW
CoInitialize
CoUninitialize
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
CoInitializeEx
CoInitializeSecurity
CoTaskMemFree
CoSetProxyBlanket
CoCreateGuid
VariantChangeType
VariantInit
VariantClear
SysAllocStringLen
SysAllocString
SysFreeString
URLDownloadToFileW
IsValidURL
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetProcessImageFileNameW
GetModuleFileNameExW
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
WinVerifyTrust
UuidCreate
RpcStringFreeW
UuidToStringW
InternetCrackUrlW
InternetCloseHandle
InternetOpenW
DeleteUrlCacheEntryW
HttpSendRequestExW
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
InternetConnectW
LresultFromObject
CreateStdAccessibleObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ