Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
e9814f94a08d6b264177911fd41975ddaf5dc9fb78bfe954d61a4bd754ca8713.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9814f94a08d6b264177911fd41975ddaf5dc9fb78bfe954d61a4bd754ca8713.exe
Resource
win10v2004-20220812-en
Target
e9814f94a08d6b264177911fd41975ddaf5dc9fb78bfe954d61a4bd754ca8713
Size
57KB
MD5
71e054a5ad06453468b5233c536463b0
SHA1
3b5f00c8ca42111ae0070b8374db556d20f910ac
SHA256
e9814f94a08d6b264177911fd41975ddaf5dc9fb78bfe954d61a4bd754ca8713
SHA512
daf7bf0832db89dde30af8883ee5f25b94b6b716fc213807dd511ca296e843085510cdaccb094a88c35ccffa5aef74b68ae5759fd6847f50287fcda2aeea0199
SSDEEP
768:KeDecxKlSd5IlmljI9cXr9mRu0aWeurnAh73+FO6m3TRE7E5Dedza0Vz4Z/jf5:KeaRSd5Y8qRFjQ56m3TRALJBCZ/N
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_controlfp
__set_app_type
__p__fmode
__p__commode
memmove
_ftol
__CxxFrameHandler
??2@YAPAXI@Z
malloc
realloc
free
_except_handler3
sprintf
_access
_beginthreadex
__dllonexit
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
??3@YAXPAX@Z
RaiseException
GetDiskFreeSpaceExA
LocalAlloc
GetStartupInfoA
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
Sleep
SetEvent
InterlockedExchange
CancelIo
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrlenA
TerminateThread
lstrcatA
GetTickCount
GetLastError
GetCurrentProcess
HeapAlloc
GetProcessHeap
VirtualProtect
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
LocalFree
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
ExitProcess
GetModuleFileNameA
DeleteFileA
DuplicateHandle
OpenProcess
CreateDirectoryA
GetLocalTime
OpenEventA
WinExec
ExpandEnvironmentStringsA
GetCurrentThreadId
CopyFileA
lstrcmpiA
Process32Next
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
OpenInputDesktop
PostThreadMessageA
GetInputState
GetMessageA
OpenDesktopA
CloseDesktop
wsprintfA
ExitWindowsEx
CloseServiceHandle
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ