Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
040.exe
Resource
win10v2004-20220414-en
Target
040.exe
Size
371KB
MD5
011f82638e33b5c1df66dab43ec2fd18
SHA1
1157a0186b8010d4d5ba99008b46df6798efdb82
SHA256
d113f0b72805c9908272e053fcc5386b191254cbaf685ed66bca824d3d4a94dc
SHA512
5b141b17858a1fdf821c25f8130d7a8f88c401ff56d46eca0037b03bfad8a5470ef8a07065da36d605747d897c1d288549959539cb0fa80d3b251084aa3bea54
SSDEEP
6144:oOHeB3uoSJdskGtgUSxE916KEqYD1nBFjvTB1F29gHUtmSjA61An59XmvtUnV:oO+B+Vit8xokZJBFjvToKHdiAsc593nV
resource | yara_rule |
---|---|
sample | diamondfox |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_SYSTEM
memset
memcpy
wcslen
wcscpy
wcscat
wcscmp
memmove
wcschr
_CIlog
floor
ceil
_CIpow
strstr
strlen
_strnicmp
strcmp
strncpy
strcpy
sprintf
_wcsicmp
tolower
wcsncpy
fabs
malloc
free
fseek
ftell
fread
fclose
pow
??3@YAXPAX@Z
wcsncmp
wcsstr
_wcsnicmp
_wcsdup
_isnan
_vsnwprintf
cos
fmod
sin
abs
GetModuleHandleW
HeapCreate
CreateMutexW
GetLastError
HeapDestroy
ExitProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
CloseHandle
GetTickCount
LoadLibraryW
GetDiskFreeSpaceExW
GetSystemPowerStatus
CreateProcessW
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
TerminateProcess
GetModuleFileNameW
VirtualFree
VirtualAlloc
FreeLibrary
VirtualProtect
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateThread
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
HeapFree
PeekNamedPipe
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadFile
HeapReAlloc
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsGetValue
GetProcAddress
Sleep
GetSystemInfo
GlobalMemoryStatusEx
GetComputerNameW
CreateDirectoryW
SetFileAttributesW
CopyFileW
DeleteFileW
GetTempPathW
GetDriveTypeW
FindFirstFileW
FindClose
GetFileAttributesW
WriteFile
CreateFileW
SetFilePointer
GetFileSize
WideCharToMultiByte
GetVersionExW
MultiByteToWideChar
HeapSize
TlsFree
DeleteCriticalSection
InterlockedCompareExchange
InterlockedExchange
SetLastError
UnregisterWait
GetCurrentThread
RegisterWaitForSingleObject
GdiplusStartup
GdipCreateBitmapFromFile
GdipSaveImageToFile
GdipDisposeImage
GdiplusShutdown
GdipDeleteFont
GdipDeleteGraphics
GdipDeletePath
GdipDeleteMatrix
GdipDeletePen
GdipDeleteStringFormat
GdipFree
GdipGetDpiX
GdipGetDpiY
GetSystemMetrics
GetCursorPos
GetDC
ReleaseDC
DestroyIcon
FillRect
CharUpperW
CharLowerW
GetIconInfo
DrawIconEx
BitBlt
GetObjectType
DeleteObject
GetObjectW
CreateCompatibleDC
SelectObject
CreateSolidBrush
DeleteDC
GdiGetBatchLimit
GdiSetBatchLimit
CreateDIBSection
CreateBitmap
SetPixel
GetStockObject
GetDIBits
CreateDCW
GetDeviceCaps
GetTextExtentPoint32W
SetBkMode
SetTextAlign
SetBkColor
SetTextColor
TextOutW
SetStretchBltMode
SetBrushOrgEx
StretchBlt
CreateFontIndirectW
GetTextMetricsW
CreateCompatibleBitmap
GetPixel
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
GetUserNameW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExW
closesocket
WSACleanup
WSAStartup
timeBeginPeriod
PathFileExistsW
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
ZwUnmapViewOfSection
IsUserAdmin
URLDownloadToFileW
InternetOpenW
InternetSetOptionW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ