Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
c7d73afed7d47246276f779e1486643f39d5e06a624a4bd5b0aa097887437d94.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7d73afed7d47246276f779e1486643f39d5e06a624a4bd5b0aa097887437d94.exe
Resource
win10v2004-20220812-en
Target
c7d73afed7d47246276f779e1486643f39d5e06a624a4bd5b0aa097887437d94
Size
125KB
MD5
2bc093f213df495b2f8205a137293307
SHA1
f9b509009c46fbbc2d44f8e96240487cc8c9a607
SHA256
c7d73afed7d47246276f779e1486643f39d5e06a624a4bd5b0aa097887437d94
SHA512
0a91d9c00769a087e556d27feef03a10af2e95c6922a32b26ea46cf51bfe9354c9000679ddc14307bd795e549d9c8919e3b571373b55b1d8bea57fc303c42878
SSDEEP
3072:PohEuIyQS8tggstGTrfftwgu9+8shJJtOulJllV1O7:whoyQSyggiGTLDuMthJJtOulJc
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
lstrcatA
CloseHandle
CreateFileA
GetModuleFileNameA
ExitProcess
DeleteFileA
SetFileAttributesA
MoveFileA
FreeResource
lstrlenA
WriteFile
SizeofResource
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
LoadResource
FindResourceA
GetTickCount
GetTempPathA
FreeLibrary
LoadLibraryA
ReadFile
SetFilePointer
lstrcmpiA
SetLastError
lstrcpyA
GetFileAttributesA
lstrcmpA
Sleep
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetUnhandledExceptionFilter
ReleaseMutex
WinExec
CreateMutexA
GetCommandLineA
GetCurrentThreadId
GetStartupInfoA
RaiseException
InterlockedExchange
LocalAlloc
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strchr
malloc
realloc
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ