Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
--d8kxdir.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
--d8kxdir.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
.............exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
.............exe
Resource
win10v2004-20220414-en
Target
--d8kxdir.zip
Size
9.8MB
MD5
7c2d211e903c679f653ca6138b4cf110
SHA1
98cf44677ba20c3b927c5866a14289692d84c386
SHA256
fea70f1113b11df7ee03d4889418d06d1fa1f99d705aafdbdbfbace317812452
SHA512
a46ad87863441de74743bbb826dd0d1e960e2c3f1e86ff9b3873d8bab43cb41d06f5445ae463ce51b5f24a0808fbe887f5b79fe8e736f57d5b005af4583c08e8
SSDEEP
196608:i1zTnpQ2hKx1tAK0ylTcmiv0QgfePC72uajZitOOhv0bDEGeaZ19:ilTa8KrNc/LHC7cdGlPZo19
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapDestroy
HeapReAlloc
HeapSize
SetLastError
GetLogicalDriveStringsW
GetDriveTypeW
DeviceIoControl
GetDiskFreeSpaceExW
GetVolumeInformationW
DuplicateHandle
GetFileAttributesExW
FindFirstFileExW
GetCurrentDirectoryA
WritePrivateProfileStringA
WritePrivateProfileStringW
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceW
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetLocalTime
CreateMutexW
GetVersionExW
SetEndOfFile
WriteConsoleW
SetStdHandle
LCMapStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
GetWindowsDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetStartupInfoW
Sleep
DecodePointer
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
OpenProcess
CreateProcessW
GetStdHandle
GetExitCodeProcess
SetFilePointer
WriteFile
ReadFile
GetModuleFileNameW
FindClose
DeleteFileW
FindNextFileW
FindFirstFileW
MoveFileExW
GetFileSize
GetFileSizeEx
CreateFileW
SetEvent
CloseHandle
TerminateThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
GetCPInfo
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineW
IsDebuggerPresent
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
GetProcAddress
FindResourceExW
GetLastError
WaitForSingleObject
CreateEventW
RaiseException
CreateDirectoryW
FreeLibrary
TerminateProcess
GetCurrentDirectoryW
GetSystemTimeAsFileTime
GetCurrentThread
GetACP
ExitProcess
MulDiv
GetCurrentProcessId
EncodePointer
CreateThread
ExitThread
LoadLibraryExW
RtlUnwind
CreateTimerQueue
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
WaitForSingleObjectEx
SetWindowPos
SendMessageW
BringWindowToTop
SetForegroundWindow
ShowWindow
GetWindowLongW
GetDC
ReleaseDC
IsIconic
GetSystemMetrics
KillTimer
SetTimer
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
EnableWindow
ClientToScreen
GetPropW
SetPropW
FindWindowExW
wsprintfW
LoadBitmapW
RegisterClassW
LoadCursorW
EndPaint
BeginPaint
wvsprintfW
SetCursor
UnionRect
OffsetRect
GetMessageW
TranslateMessage
DispatchMessageW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
IsWindow
SetFocus
GetWindow
LoadImageW
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
FillRect
CreateCaret
HideCaret
ShowCaret
SetCaretPos
SetRect
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
GetGUIThreadInfo
GetParent
DrawTextW
GetClientRect
SetWindowTextW
PostQuitMessage
MessageBoxW
DestroyWindow
SetWindowLongW
CreateWindowExW
PostMessageW
DefWindowProcW
CreateSolidBrush
SetBkMode
SetTextColor
CreateFontW
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
GetStockObject
GetObjectW
DeleteDC
GetDeviceCaps
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CombineRgn
CreatePenIndirect
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
CreateDIBSection
MoveToEx
TextOutW
ExtTextOutW
GdiFlush
RegCloseKey
RegQueryValueExW
RegCreateKeyW
DuplicateTokenEx
OpenProcessToken
ord165
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetFolderPathW
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoUninitialize
CoInitialize
PathFileExistsW
PathIsRootW
StrStrIW
StrStrIA
socket
setsockopt
connect
send
closesocket
shutdown
recv
gethostbyname
inet_addr
ntohs
WSAStartup
HttpSendRequestExW
InternetConnectW
InternetOpenW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
EnumProcessModules
GetModuleFileNameExW
GetAdaptersInfo
_TrackMouseEvent
ord17
ImmSetCompositionFontW
ImmReleaseContext
ImmGetContext
ImmGetVirtualKey
ImmSetCompositionWindow
SysFreeString
VariantClear
VariantInit
SysAllocString
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipDeleteGraphics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ