Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
e85415477ce6fa5f5af429bae00413ebf24f6143c429bc63cbdd56bbc92da054.dll
Resource
win7-20220901-en
Target
e85415477ce6fa5f5af429bae00413ebf24f6143c429bc63cbdd56bbc92da054
Size
838KB
MD5
665e55bc31e33f62118b78badda83770
SHA1
8489f2b0ca98db067c9e052c566bf64a517a706a
SHA256
e85415477ce6fa5f5af429bae00413ebf24f6143c429bc63cbdd56bbc92da054
SHA512
77a0b69ca89cbd0efcc6deee90fac790c7a8118922f476b455bd76e45eff891a2c05fda0933049b77b20b9093aadc26759bbf65ffb1e33e009d5f8b0a5f2247d
SSDEEP
24576:QOHJERcGT0X5u2lOqr5pKp2sVdpk38Vj4:QOkcGT0XxC5V838R4
resource | yara_rule |
---|---|
sample | vmprotect |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
HeapReAlloc
HeapFree
GetModuleFileNameW
lstrlenW
lstrcatW
GetModuleHandleW
GetProcAddress
lstrcpynW
CreateDirectoryW
GetTempPathW
GetTempFileNameW
GetWindowsDirectoryW
GetLogicalDriveStringsW
lstrcpyW
GetDriveTypeW
FindFirstFileW
FindClose
CreateFileW
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
CloseHandle
WriteFile
OpenProcess
ExpandEnvironmentStringsW
DeleteFileW
GetLastError
SetFileAttributesW
FindNextFileW
GetSystemDirectoryW
LoadLibraryW
FreeLibrary
GetFileSize
SetFilePointer
GetLocalTime
SetEndOfFile
lstrlenA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
MultiByteToWideChar
ResumeThread
GetTickCount
CreateToolhelp32Snapshot
GetCurrentProcessId
Module32FirstW
Module32NextW
GetCommandLineW
FreeResource
FindResourceW
LoadResource
GetPrivateProfileStringW
WaitNamedPipeW
InitializeCriticalSection
WideCharToMultiByte
TerminateThread
CopyFileW
SizeofResource
HeapDestroy
HeapCreate
ReadFile
GetLongPathNameW
MoveFileW
LockResource
SetNamedPipeHandleState
DeleteCriticalSection
GetVersion
GetVolumeInformationW
lstrcmpiA
lstrcpynA
LocalAlloc
LocalFree
ReadProcessMemory
CreateThread
OpenThread
SetLastError
lstrcatA
lstrcpyA
CreateDirectoryA
SetFileAttributesA
DeleteFileA
GetModuleFileNameA
GetExitCodeThread
GetCurrentThreadId
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
DeviceIoControl
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
VirtualQuery
VirtualProtect
lstrcmpA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
InterlockedExchange
LoadLibraryA
RaiseException
GetCommandLineA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
HeapSize
GetConsoleCP
GetConsoleMode
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetProcessHeap
DllCanUnloadNow
DllGetClassObject
DllGetVersion
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ