Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
AdvancedRun.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AdvancedRun.exe
Resource
win10v2004-20220812-en
Target
AdvancedRun.exe
Size
88KB
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA1
9a4a1581cc3971579574f837e110f3bd6d529dab
SHA256
29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512
036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
SSDEEP
1536:JW3osrWjET3tYIrrRepnbZ6ObGk2nLY2jR+utQUN+WXim:HjjET9nX0pnUOik2nXjR+utQK+g3
resource | yara_rule |
---|---|
sample | Nirsoft |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
CN=Nir Sofer,O=Nir Sofer,POSTALCODE=7135117,STREET=Dakar 21\, Unit 82,L=Lod,C=IL
CN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_onexit
__dllonexit
swscanf
_wcslwr
_c_exit
qsort
_itow
wcscmp
free
modf
_exit
_XcptFilter
_cexit
strlen
exit
_memicmp
memcmp
wcstoul
_wcmdln
malloc
_wcsicmp
??3@YAXPAX@Z
??2@YAPAXI@Z
_ultow
memcpy
_purecall
wcsrchr
wcscpy
memset
wcslen
wcschr
_wcsnicmp
_wtoi
wcscat
_snwprintf
wcsncat
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
__wgetmainargs
_initterm
__setusermatherr
ord17
ImageList_Create
ImageList_SetImageCount
ImageList_AddMasked
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VirtualFreeEx
EnumResourceTypesW
VirtualAllocEx
WriteProcessMemory
ResumeThread
CompareFileTime
GetModuleHandleA
GetStartupInfoW
CreateRemoteThread
CreateToolhelp32Snapshot
Process32NextW
CreateProcessW
CloseHandle
SetEnvironmentVariableW
GetCurrentProcessId
GetEnvironmentStringsW
ExpandEnvironmentStringsW
GetLastError
WaitForSingleObject
OpenProcess
ReadProcessMemory
GetProcessAffinityMask
SetProcessAffinityMask
FreeEnvironmentStringsW
SearchPathW
GetExitCodeProcess
FreeLibrary
LoadLibraryW
GetProcAddress
FileTimeToSystemTime
GetModuleHandleW
GetDriveTypeW
SizeofResource
GetDateFormatW
FormatMessageW
GetVersionExW
GetWindowsDirectoryW
GetTimeFormatW
GetFileAttributesW
WriteFile
GetModuleFileNameW
LockResource
LocalFree
FindResourceW
lstrcpyW
LoadResource
lstrlenW
GetSystemDirectoryW
LoadLibraryExW
WideCharToMultiByte
EnumResourceNamesW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
SetErrorMode
GetCurrentDirectoryW
ExitProcess
GetCurrentProcess
Process32FirstW
SetCursor
LoadCursorW
GetSysColorBrush
ShowWindow
ChildWindowFromPoint
SetWindowTextW
UpdateWindow
SendMessageW
GetWindowPlacement
SetDlgItemTextW
GetDlgItemTextW
BeginPaint
GetClientRect
GetSystemMetrics
DeferWindowPos
GetWindowRect
SetWindowPos
SendDlgItemMessageW
EndDialog
GetWindowTextLengthW
SetWindowLongW
GetDlgItem
GetWindow
EndPaint
InvalidateRect
DrawFrameControl
MessageBoxW
LoadImageW
GetSysColor
GetWindowLongW
BeginDeferWindowPos
GetKeyState
CallWindowProcW
EndDeferWindowPos
SetFocus
GetMenuItemCount
GetParent
EnableWindow
MapWindowPoints
GetDC
ReleaseDC
GetClassNameW
MoveWindow
GetMenuItemInfoW
GetDlgCtrlID
DestroyMenu
DialogBoxParamW
CreateDialogParamW
EnumChildWindows
LoadStringW
DestroyWindow
GetDesktopWindow
GetWindowTextW
LoadMenuW
DestroyIcon
GetDeviceCaps
SetTextColor
CreateFontIndirectW
SetBkMode
DeleteObject
GetSaveFileNameW
GetOpenFileNameW
OpenProcessToken
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
OpenSCManagerW
RegCloseKey
RegDeleteKeyW
CloseServiceHandle
RevertToSelf
ImpersonateLoggedOnUser
QueryServiceStatus
OpenServiceW
StartServiceW
SHGetPathFromIDListW
SHGetMalloc
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
ShellExecuteExW
DragQueryFileW
DragAcceptFiles
DragFinish
CoUninitialize
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ