Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
5ffc977cefdce10e7c71445190972e06316e14f382ae52e3089005a449a7f687.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5ffc977cefdce10e7c71445190972e06316e14f382ae52e3089005a449a7f687.exe
Resource
win10v2004-20220721-en
Target
5ffc977cefdce10e7c71445190972e06316e14f382ae52e3089005a449a7f687
Size
1.2MB
MD5
e00dc8cd4e78bbc4b214d6f3040969dd
SHA1
35bda6dfb023243148c16962cccf4e257aa2582d
SHA256
5ffc977cefdce10e7c71445190972e06316e14f382ae52e3089005a449a7f687
SHA512
4b1cea9a44786d0e5112ca97a8dc5cb54c9a0729a011a29ee18782873c3c6ff8413259e814260281289defc2c4c80ccaa972c2209fcee06336b9bea65acb3525
SSDEEP
24576:T4JgqzfJ45qhAceTXipNyxD9PD8sOx/nZUC/dfNyGZSw:T4aXipNo9QsoUwd1hww
Processes:
resource | yara_rule |
---|---|
sample | family_egregor |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=5128862,CN=Discord Inc.,O=Discord Inc.,L=San Francisco,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Thread32First
Thread32Next
CreateEventW
GetFileAttributesA
GetFileAttributesW
MoveFileExW
GetCurrentProcessId
ProcessIdToSessionId
OpenProcess
LocalFree
VirtualAlloc
VirtualFree
VirtualQuery
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetSystemInfo
GetNativeSystemInfo
VirtualQueryEx
ReadProcessMemory
IsWow64Process
GetSystemTimeAsFileTime
lstrcmpiW
QueryFullProcessImageNameW
Process32FirstW
Process32NextW
RtlCaptureStackBackTrace
WriteConsoleW
ReadConsoleW
ReadFile
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetProcessId
GetExitCodeThread
GetProcessTimes
SetLastError
OpenFileMappingA
LoadLibraryW
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
GetSystemDirectoryW
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
GetModuleHandleW
GetModuleFileNameW
GetCurrentProcess
WaitForSingleObject
GetLastError
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
SetFilePointerEx
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
CloseHandle
GetFinalPathNameByHandleW
GetProcAddress
CreateFileW
OutputDebugStringA
GetCommandLineW
VerifyVersionInfoW
VerSetConditionMask
GetModuleHandleExW
SetConsoleCtrlHandler
GetFileType
WriteFile
GetStdHandle
ExitProcess
ExitThread
RtlUnwind
RaiseException
QueryPerformanceCounter
QueryPerformanceFrequency
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SetEvent
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
SetProcessAffinityMask
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
FormatMessageW
CreateWindowExA
UnhookWindowsHookEx
PostThreadMessageW
EnumThreadWindows
RegisterClassA
DefWindowProcA
IsWindowVisible
GetWindow
GetWindowThreadProcessId
EnumWindows
EnumChildWindows
GetWindowLongW
SetEntriesInAclW
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
ConvertSidToStringSidA
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
SetSecurityInfo
SetNamedSecurityInfoW
GetSecurityInfo
GetNamedSecurityInfoW
OpenProcessToken
FreeSid
AllocateAndInitializeSid
RegGetValueW
CommandLineToArgvW
CoTaskMemFree
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
VariantClear
PathRemoveFileSpecW
PathFindFileNameW
wnsprintfW
CryptMsgClose
CryptMsgGetParam
CertFindCertificateInStore
CertFreeCertificateContext
CryptHashPublicKeyInfo
CertGetNameStringW
CryptQueryObject
CertCloseStore
QueryWorkingSet
EnumProcesses
GetModuleInformation
EnumProcessModulesEx
GetModuleFileNameExW
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ