Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
bac73e4ccb2d8ad5133151fcc58abe352c2d3a9d5132017427f8a49027f43585.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bac73e4ccb2d8ad5133151fcc58abe352c2d3a9d5132017427f8a49027f43585.exe
Resource
win10v2004-20220812-en
Target
bac73e4ccb2d8ad5133151fcc58abe352c2d3a9d5132017427f8a49027f43585
Size
128KB
MD5
0ab9bc447e0b7ac4ed65196ce9c7cd1d
SHA1
21fbb5a763ec5cd8c3c3e29bf53c6f7fe43afb34
SHA256
bac73e4ccb2d8ad5133151fcc58abe352c2d3a9d5132017427f8a49027f43585
SHA512
379b3a49238097aad70f4fbe1acd434dc7860fe235c574f6b98892facc72f3a46b7b4cc7c4f314157b21cb8edad041e2d6a79017d6052de817f184375741b85c
SSDEEP
3072:owPg985ehyQPR874zV2jb+aJolAoydGMvfUyItwT0g2QTaXnOk:ouk7hyQPC7gV2jbK7yUovItS0g2UcL
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
lstrcatA
CloseHandle
CreateFileA
GetModuleFileNameA
ExitProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
DeleteFileA
SetFileAttributesA
MoveFileA
FreeResource
lstrlenA
WriteFile
SizeofResource
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
LoadResource
FindResourceA
GetTickCount
GetTempPathA
FreeLibrary
LoadLibraryA
ReadFile
SetFilePointer
lstrcpyA
lstrcmpiA
SetLastError
GetFileAttributesA
lstrcmpA
Sleep
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetUnhandledExceptionFilter
GetLocalTime
ReleaseMutex
WinExec
CreateMutexA
GetCommandLineA
GetCurrentThreadId
GetStartupInfoA
RaiseException
InterlockedExchange
LocalAlloc
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strncat
strchr
malloc
realloc
_except_handler3
_strnicmp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ