Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2475b889b3b006b6fa76e18984458dd2d4e22900f546deb9fbde7c818d73c3b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2475b889b3b006b6fa76e18984458dd2d4e22900f546deb9fbde7c818d73c3b6.exe
Resource
win10v2004-20220812-en
Target
2475b889b3b006b6fa76e18984458dd2d4e22900f546deb9fbde7c818d73c3b6
Size
257KB
MD5
fed271c0eb3987d33e9a45a5b91d43b8
SHA1
4fe86c958a2c018fe78147837da853ee02004eed
SHA256
2475b889b3b006b6fa76e18984458dd2d4e22900f546deb9fbde7c818d73c3b6
SHA512
5909837b9af89fc5d614895936b7942805698d31ffaf841b4c325ca8d700d326d81172e9dfb9c4ab1699a9631fa8f39ae38d121dfe8f2d3e6f3a15ade921dddf
SSDEEP
6144:S4mkhn9KfKQLxUH8Ln+lUA1vswSdjStWMw:S0GdL+lUshsjStWMw
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameExA
EnumProcessModules
WritePrivateProfileStringA
GetCurrentDirectoryA
RtlUnwind
HeapFree
HeapAlloc
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapSize
HeapReAlloc
GetTimeZoneInformation
GetACP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
FileTimeToLocalFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetProcessVersion
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetTempFileNameA
GetFileAttributesA
GlobalAlloc
lstrcmpA
GetCurrentThread
GetModuleFileNameA
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
GetVolumeInformationA
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
FindNextFileA
FindFirstFileA
FindClose
LocalFree
LoadLibraryA
FreeLibrary
GetCurrentThreadId
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcatA
lstrcpyA
GlobalGetAtomNameA
GlobalAddAtomA
lstrcpynA
GlobalLock
GlobalUnlock
GetModuleHandleA
GetProcAddress
SetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MulDiv
lstrlenA
CreateMutexA
GetLastError
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
Sleep
GetVersion
GetVersionExA
VirtualAlloc
EndDeferWindowPos
BeginDeferWindowPos
GetClientRect
DeferWindowPos
AdjustWindowRectEx
DispatchMessageA
MapWindowPoints
SendDlgItemMessageA
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ValidateRect
TranslateMessage
GetMessageA
CharUpperA
PostQuitMessage
ShowOwnedPopups
LoadStringA
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyIcon
GetTopWindow
MessageBoxA
IsChild
RegisterClassA
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetLastActivePopup
BringWindowToTop
IsIconic
GetFocus
EqualRect
GetDlgItem
SetWindowLongA
wsprintfA
GetKeyState
SetWindowPos
GetDlgCtrlID
GetMenuItemCount
GetSubMenu
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetActiveWindow
WinHelpA
SetMenu
GetMenu
GetClassInfoA
SetFocus
GetParent
GetActiveWindow
ShowWindow
IsWindow
GetDesktopWindow
IsWindowEnabled
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ClientToScreen
ScreenToClient
DestroyMenu
DrawStateA
SetRect
FillRect
GetWindowLongA
InvalidateRect
UpdateWindow
EnableWindow
SendMessageA
GetWindow
GetForegroundWindow
GetCursorPos
GetWindowThreadProcessId
IsWindowVisible
CreatePopupMenu
AppendMenuA
PostMessageA
KillTimer
SetForegroundWindow
FindWindowA
EnumWindows
SetTimer
RegisterWindowMessageA
GetDC
ReleaseDC
CopyRect
LoadIconA
OffsetRect
DrawIconEx
GetSysColor
LoadMenuA
UnregisterClassA
MoveToEx
LineTo
ScaleWindowExtEx
CreatePen
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
DPtoLP
GetObjectA
GetClipBox
DeleteDC
GetDeviceCaps
GetTextExtentPoint32A
RoundRect
CreateSolidBrush
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkMode
SetBkColor
GetStockObject
RestoreDC
DeleteObject
CreateFontIndirectA
Rectangle
SelectObject
GetTextMetricsA
SaveDC
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegOpenKeyA
RegCreateKeyExA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
GetUserNameA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueA
ExtractIconA
Shell_NotifyIconA
ShellExecuteExA
DragQueryFileA
SHGetFileInfoA
DragFinish
_TrackMouseEvent
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ