Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-18_a061fbb818f6bde424d083d4529f6834_bkransomware_floxif_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-18_a061fbb818f6bde424d083d4529f6834_bkransomware_floxif_karagany.exe
Resource
win10v2004-20241007-en
Target
2024-12-18_a061fbb818f6bde424d083d4529f6834_bkransomware_floxif_karagany
Size
971KB
MD5
a061fbb818f6bde424d083d4529f6834
SHA1
8f0a4e4203a97b7adcbeeccc1d6f8952ec37ae09
SHA256
2a51e2f1f7bb482735e3390a84cb745b0ae8e5bdd1018fe8181d188a9af0832d
SHA512
cdd830d6009c291d2df36f5e1d882c2d7962e5171448759e0ea0a026d34479cc7f915840e0feef433bb889050712030017f30989304f1b6b0923309193e01342
SSDEEP
12288:u5xktWZoK3+REjIU+diRzSkYgQK1QzFXE0owUlg2t9ExxsxJdjwg+Tz+UVnF6wg+:SjX9uwwUlLt9ExmW3yNJBpvq1rEH7A
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\FNP-11.16.5\tier1\flexnet\master\build\_release-Windows-ipv6.NT4-i686-main\lmgrd.exe.pdb
TlsFree
GetTickCount
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
IsDebuggerPresent
IsProcessorFeaturePresent
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
RtlUnwind
OutputDebugStringW
TlsSetValue
HeapReAlloc
GetStringTypeW
HeapSize
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
TlsAlloc
TlsGetValue
HeapAlloc
TerminateProcess
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
WriteFile
GetModuleFileNameA
GetStartupInfoW
DeleteCriticalSection
GetFileType
GetStdHandle
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
LocalAlloc
LocalFree
SetEvent
WaitForSingleObject
CreateEventA
CreateProcessA
WaitForMultipleObjects
GenerateConsoleCtrlEvent
AllocConsole
GetCommandLineW
CreateProcessW
GetWindowsDirectoryA
SetConsoleTitleA
GetExitCodeProcess
GetStartupInfoA
GetEnvironmentVariableA
GetEnvironmentVariableW
GetVersionExA
SetHandleInformation
SetErrorMode
GetVersion
LoadLibraryA
FormatMessageA
GetEnvironmentStrings
FreeEnvironmentStringsA
lstrlenA
ResetEvent
FindClose
FindFirstFileA
FindNextFileA
CreateFileA
ReadFile
SetNamedPipeHandleState
SleepEx
WaitNamedPipeA
FindFirstFileW
FindNextFileW
GetProcessTimes
InitializeCriticalSection
ReleaseMutex
CreateMutexA
VirtualAlloc
VirtualFree
GetDriveTypeA
GetVolumeInformationA
GetLocalTime
GetTimeZoneInformation
GetModuleHandleA
DeviceIoControl
LoadLibraryExA
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateDirectoryW
DeleteFileW
GetFileAttributesExW
CreateThread
ExitThread
ResumeThread
ReadConsoleW
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableA
GetFullPathNameA
AreFileApisANSI
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
EncodePointer
GetCurrentThreadId
SetLastError
GetLastError
GetCommandLineA
closesocket
__WSAFDIsSet
getnameinfo
freeaddrinfo
getaddrinfo
inet_ntoa
inet_addr
getsockopt
recv
connect
send
setsockopt
WSAGetLastError
getprotobyname
htonl
WSAStartup
WSACleanup
select
ioctlsocket
socket
SetDlgItemTextA
GetDlgItem
EndDialog
MoveWindow
GetDlgItemTextA
SendMessageA
GetSystemMetrics
MessageBoxA
GetActiveWindow
wsprintfA
DialogBoxIndirectParamA
CreateDialogIndirectParamA
GetParent
GetWindowLongA
ScreenToClient
MessageBeep
GetWindowRect
GetClientRect
SetWindowTextA
GetDlgItemTextW
EnableWindow
GetFocus
SetFocus
ShowWindow
Netbios
RegQueryValueExW
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
DeregisterEventSource
RegisterEventSourceA
ReportEventA
GetUserNameA
GetUserNameW
OpenProcessToken
RegSetValueExA
RegSetValueExW
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
StartServiceA
RegEnumKeyExA
RegQueryInfoKeyA
ord17
GetOpenFileNameA
SysFreeString
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SafeArrayUnaccessData
VariantInit
VariantClear
SafeArrayAccessData
SysAllocString
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoSetProxyBlanket
DhcpRequestParams
ord680
PathRemoveBackslashW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ