Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
2fe2495e9c26d6a7972bef873af50be3be1258b65893e00b4195ecf9cfe3d376.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2fe2495e9c26d6a7972bef873af50be3be1258b65893e00b4195ecf9cfe3d376.exe
Resource
win10v2004-20220812-en
Target
2fe2495e9c26d6a7972bef873af50be3be1258b65893e00b4195ecf9cfe3d376
Size
125KB
MD5
04759a37e9803f6e6ad86762174135b0
SHA1
90b3fbfda2176ff7a935e6df87821530fca3c5f7
SHA256
2fe2495e9c26d6a7972bef873af50be3be1258b65893e00b4195ecf9cfe3d376
SHA512
e69a460e8d2caed0e09787f7883eafe9610129bc94bc3187cb2fd11f97ca998341abaaf751f600c6d1c84ad09ea9663c50dd9f93015856c70141c9677af1cf54
SSDEEP
3072:BoFyO6yQP1LggstGTrfftwgu9+8sFJJtO5l8llV1Oz:mFwyQPlggiGTLDuMtFJJtO5l8y
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
lstrcatA
CloseHandle
CreateFileA
GetModuleFileNameA
ExitProcess
DeleteFileA
SetFileAttributesA
MoveFileA
FreeResource
lstrlenA
WriteFile
SizeofResource
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
LoadResource
FindResourceA
GetTickCount
GetTempPathA
FreeLibrary
LoadLibraryA
ReadFile
SetFilePointer
lstrcmpiA
SetLastError
lstrcpyA
GetFileAttributesA
lstrcmpA
Sleep
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetUnhandledExceptionFilter
ReleaseMutex
WinExec
CreateMutexA
GetCommandLineA
GetCurrentThreadId
GetStartupInfoA
RaiseException
InterlockedExchange
LocalAlloc
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strchr
malloc
realloc
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ