Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9bd1152b389005933fc5d2a446c62f72a16c9764e1a836b87222b04909f96b0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9bd1152b389005933fc5d2a446c62f72a16c9764e1a836b87222b04909f96b0b.exe
Resource
win10v2004-20220901-en
Target
9bd1152b389005933fc5d2a446c62f72a16c9764e1a836b87222b04909f96b0b
Size
1.7MB
MD5
40ed88567321aec7b1c89698fa21dc76
SHA1
cd1a24a3c885cde05e1e321d8f7d62bf5c6e054d
SHA256
9bd1152b389005933fc5d2a446c62f72a16c9764e1a836b87222b04909f96b0b
SHA512
b69655f2b8baa33e2418a1bdef2ade2238b250f734accd9dd3189a22bc62c360b714fa88d2f08de826fe61461cb6b14e51b60245d2aad52912b5d1f159883791
SSDEEP
49152:KdJdvKhjM2uhwnsLDO3sK4OmDltB/QXlbuW:VM2uhwnsLDO4OmtAwW
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExpandEnvironmentStringsW
CreateProcessW
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
QueueUserAPC
ResumeThread
TerminateProcess
OpenProcess
WaitForSingleObject
GetModuleFileNameW
GetCurrentProcess
CloseHandle
LoadLibraryW
GetProcAddress
FreeLibrary
GetLastError
lstrcmpiW
SetEnvironmentVariableA
CompareStringW
GetDriveTypeW
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
RaiseException
GetExitCodeProcess
CreateFileW
DuplicateHandle
GetFileInformationByHandle
GetDateFormatW
InterlockedCompareExchange
VerifyVersionInfoW
VerSetConditionMask
GetShortPathNameW
MoveFileExW
GetFileAttributesExW
GetFileAttributesW
SizeofResource
LockResource
LoadResource
FindResourceW
GetCurrentThreadId
ReadFile
SetFilePointer
SetFileTime
WriteFile
RemoveDirectoryW
LoadLibraryExW
GetFileTime
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
GetModuleHandleA
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetCommandLineW
GetNativeSystemInfo
GetVersionExW
GetTempFileNameW
GetFileSize
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
FileTimeToSystemTime
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
FindClose
CreateFileMappingW
SetCurrentDirectoryW
FindNextFileW
FileTimeToLocalFileTime
InterlockedExchangeAdd
IsDebuggerPresent
GetUserDefaultLangID
VirtualQueryEx
AssignProcessToJobObject
GetStdHandle
Process32FirstW
GetProcessId
Process32NextW
HeapSetInformation
CreateToolhelp32Snapshot
QueryPerformanceCounter
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
RtlCaptureStackBackTrace
GetLocaleInfoW
GetUserDefaultUILanguage
Sleep
CreateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetThreadLocale
GetACP
CreateFileA
GetTimeZoneInformation
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapAlloc
GetProcessHeap
GetFullPathNameW
ExitProcess
HeapReAlloc
PeekNamedPipe
GetFileType
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetOEMCP
IsValidCodePage
HeapSize
WriteConsoleW
SetStdHandle
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CharUpperW
SetForegroundWindow
UnhookWindowsHookEx
SetWindowLongW
LoadIconW
SendMessageW
MoveWindow
GetMonitorInfoW
MonitorFromWindow
CreateWindowExW
DestroyWindow
SetWindowsHookExW
CallNextHookEx
GetWindowLongW
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxW
SendMessageTimeoutW
GetWindowThreadProcessId
IsWindow
FindWindowW
RegLoadKeyW
GetUserNameW
RegQueryValueExW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
GetTokenInformation
ConvertSidToStringSidW
GetSidSubAuthority
GetSidSubAuthorityCount
CreateProcessAsUserW
RegCreateKeyExW
RegDeleteValueW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupAccountSidW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegUnLoadKeyW
RegSetValueExW
GetSecurityDescriptorSacl
SetSecurityInfo
RegEnumValueA
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
PropVariantClear
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
StringFromGUID2
CoTaskMemFree
CLSIDFromString
CreateURLMonikerEx
WTSQueryUserToken
DestroyEnvironmentBlock
CreateEnvironmentBlock
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ntohl
timeGetTime
SHDeleteEmptyKeyW
SHStrDupW
SHDeleteKeyW
UrlCanonicalizeW
SHCopyKeyW
SysFreeString
SysAllocString
VariantInit
VariantClear
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ