Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9241ef91b438f640fffa490bba0faa48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9241ef91b438f640fffa490bba0faa48.exe
Resource
win10v2004-20220812-en
Target
9241ef91b438f640fffa490bba0faa48
Size
772KB
MD5
9241ef91b438f640fffa490bba0faa48
SHA1
c73b4bf262410d197da64d35428a9796c486b9d4
SHA256
3971036d3beaabd168334f64e182d5393a37f7f236ca983cc29f6c2f6d15107b
SHA512
4171f8a5479fa34242cafda6dcb5688729c4192711399c6ebfa02f15559f5c0cab34ad2be3581b82ee933bce225bb4461a9c8138efeda73ab64c8d62a3b55414
SSDEEP
12288:ie1IK9HlJ70VbWee8qw5oASJgoudip5SFx3LFfZtIEAj6UHkyIFMp/jkYawjagrY:igR9HjAcp8uASPX+FxVAukoYatgmbYg
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RtlInitUnicodeString
RtlGetVersion
ZwCreateFile
ZwClose
RtlCopyUnicodeString
DbgPrint
ExAllocatePool
ExFreePoolWithTag
ExInitializeNPagedLookasideList
PsCreateSystemThread
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoGetCurrentProcess
IoRegisterShutdownNotification
MmIsAddressValid
PsSetLoadImageNotifyRoutine
_snwprintf
_strlwr
RtlInitAnsiString
RtlQueryRegistryValues
RtlUnicodeStringToAnsiString
RtlFreeAnsiString
ZwOpenKey
ZwQueryValueKey
strstr
_strupr
wcsncat
wcsncmp
wcsncpy
wcsrchr
wcsstr
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
RtlTimeToTimeFields
KeInitializeEvent
KeDelayExecutionThread
KeWaitForSingleObject
ExSystemTimeToLocalTime
PsGetVersion
IofCompleteRequest
ZwQueryInformationFile
ZwReadFile
ZwWriteFile
sprintf
swprintf
rand
srand
ZwDeleteFile
ProbeForRead
PsTerminateSystemThread
ObfDereferenceObject
ObReferenceObjectByName
IoDriverObjectType
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
ExQueryDepthSList
ExpInterlockedPopEntrySList
ExpInterlockedPushEntrySList
ExDeleteNPagedLookasideList
strncpy
_vsnprintf
ExAllocatePoolWithTag
RtlInitString
ZwOpenFile
ZwCreateSection
ZwMapViewOfSection
RtlCompareString
PsGetCurrentProcessId
PsLookupProcessByProcessId
RtlImageNtHeader
PsGetProcessPeb
__C_specific_handler
strchr
_wcsupr
RtlWriteRegistryValue
RtlDeleteRegistryValue
RtlAppendUnicodeStringToString
ZwCreateKey
ZwDeleteKey
ZwEnumerateKey
ZwEnumerateValueKey
ZwQueryKey
atoi
mbstowcs
_strnicmp
strrchr
ZwSetInformationFile
strncmp
_snprintf
KeSetEvent
ObfReferenceObject
MmProbeAndLockPages
IoAllocateIrp
IoAllocateMdl
IoBuildDeviceIoControlRequest
IofCallDriver
IoFreeIrp
IoFreeMdl
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
RtlCompareUnicodeString
MmGetSystemRoutineAddress
IoCreateFile
IoGetFileObjectGenericMapping
ObQueryNameString
ZwOpenDirectoryObject
ObCreateObject
SeCreateAccessState
wcscmp
IoFileObjectType
PsThreadType
RtlAppendUnicodeToString
RtlCompareMemory
IoUnregisterShutdownNotification
ZwOpenSymbolicLinkObject
ZwQuerySymbolicLinkObject
PsSetCreateProcessNotifyRoutine
PsSetCreateProcessNotifyRoutineEx
ZwOpenProcess
ZwQuerySystemInformation
RtlImageDirectoryEntryToData
ZwQueryDirectoryFile
_wcsicmp
_wcslwr
IoGetDeviceObjectPointer
IoStopTimer
PsRemoveLoadImageNotifyRoutine
IoGetDeviceAttachmentBaseRef
_stricmp
NtOpenProcess
ZwQueryObject
ZwDuplicateObject
PsLookupThreadByThreadId
ZwOpenThread
ZwUnmapViewOfSection
KeStackAttachProcess
KeUnstackDetachProcess
ZwAllocateVirtualMemory
PsIsThreadTerminating
KeInitializeApc
KeInsertQueueApc
CmRegisterCallback
CmUnRegisterCallback
KeAcquireInStackQueuedSpinLock
KeReleaseInStackQueuedSpinLock
KeClearEvent
KeBugCheckEx
KeRevertToUserAffinityThread
KeSetSystemAffinityThread
KeCancelTimer
KeNumberProcessors
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
HalMakeBeep
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ