Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_82a34da1d30e7f932b9e179e0ca3c23a_bkransomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-02_82a34da1d30e7f932b9e179e0ca3c23a_bkransomware.exe
Resource
win10v2004-20240802-en
Target
2024-10-02_82a34da1d30e7f932b9e179e0ca3c23a_bkransomware
Size
331KB
MD5
82a34da1d30e7f932b9e179e0ca3c23a
SHA1
01f04583238f8dc6b72eab5f0f8f15eced469bfc
SHA256
285a9130315df014880abd9d4961a5a480898b095ec1f72f54d41dcc14cff851
SHA512
ae77b2642e9568e3d6fc5bfbd98da8a84ac2757bd02e1dd603296cb1834b43b601428c5b6e73de7524e525ebdf032ca751c0455e21a6e0ba477cdd182c34cd30
SSDEEP
6144:VCkXhYUp7k1IcsvPd3M7zIa5Bs21T9OMcJGDdF:VVxRncS3sIaXs21T96idF
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\My\XMiner\EpicScale\Release\EpicScale.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetCurrentThreadId
SetThreadPriority
SuspendThread
ResumeThread
GetFileAttributesExW
GetFileSizeEx
GetFileTime
EncodePointer
GetSystemDirectoryW
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetErrorMode
GlobalFlags
CompareStringW
WaitForSingleObject
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
CreateThread
ExitThread
SetStdHandle
GetFileType
HeapQueryInformation
GetStdHandle
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
TerminateProcess
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetOEMCP
GetCPInfo
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
WriteConsoleW
LCMapStringW
GetStringTypeW
SetEnvironmentVariableA
MoveFileW
DuplicateHandle
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
CreateFileW
LeaveCriticalSection
EnterCriticalSection
FormatMessageW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
GetACP
WideCharToMultiByte
GetTempPathW
SetUnhandledExceptionFilter
DecodePointer
HeapSize
RaiseException
InitializeCriticalSectionEx
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
CopyFileW
CreateDirectoryW
TerminateThread
WaitForMultipleObjects
CreateEventA
FreeLibrary
GetCommandLineW
SetLastError
GetConsoleWindow
GetLocalTime
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
GetDiskFreeSpaceW
GetModuleHandleW
DeleteFileW
GetFileAttributesW
CreateEventW
ReleaseMutex
CreateMutexA
SetEvent
MultiByteToWideChar
Sleep
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpA
lstrcpyW
LocalFree
LocalAlloc
lstrcpynW
FindResourceW
LoadResource
LockResource
SizeofResource
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
LoadLibraryA
VirtualProtect
WriteProcessMemory
lstrcmpiA
VirtualQuery
GetProcAddress
OutputDebugStringW
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleA
Module32NextW
Module32FirstW
GetLastError
GetCurrentProcess
CreateToolhelp32Snapshot
CloseHandle
ClientToScreen
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
LoadCursorW
GetSysColorBrush
ReleaseDC
GetDC
SetWindowTextW
IsWindowEnabled
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
UnhookWindowsHookEx
GetLastActivePopup
GetTopWindow
RealChildWindowFromPoint
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
GetClientRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
DestroyMenu
GetCapture
GetFocus
GetDlgCtrlID
SetWindowPos
DestroyWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
PostQuitMessage
GetClassNameW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
GetWindow
GetWindowLongW
GetWindowTextW
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
IsWindowVisible
GetMessageW
GetSystemMetrics
CharUpperW
GetDesktopWindow
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetParent
DialogBoxParamW
UnregisterClassW
UpdateWindow
DispatchMessageW
TranslateMessage
PeekMessageW
GetDlgItem
CreateDialogParamW
ShowWindow
SendMessageW
MessageBoxW
EndDialog
SetDlgItemTextW
PostMessageW
IsWindow
FindWindowW
RegisterWindowMessageW
EnableWindow
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtTextOutW
TextOutW
SetBkColor
GetDeviceCaps
SetMapMode
SelectObject
SaveDC
RestoreDC
RectVisible
PtVisible
GetStockObject
GetClipBox
Escape
DeleteObject
DeleteDC
CreateBitmap
SetTextColor
DocumentPropertiesW
ClosePrinter
OpenPrinterW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyW
RegCreateKeyExW
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
UrlUnescapeW
PathIsUNCW
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
CoCreateInstance
CoUninitialize
CoInitialize
VariantInit
VariantClear
VariantChangeType
ImageDirectoryEntryToData
CryptDecodeObject
CertGetNameStringW
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertFindCertificateInStore
CryptQueryObject
CryptMsgGetParam
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetErrorDlg
InternetSetStatusCallbackW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetSetFilePointer
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoW
LresultFromObject
CreateStdAccessibleObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ