Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
28eccab0efdfd1f1b5c375b56b6216cd2f31e8b97139e1dfea37ecf20804741b.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
28eccab0efdfd1f1b5c375b56b6216cd2f31e8b97139e1dfea37ecf20804741b.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
28eccab0efdfd1f1b5c375b56b6216cd2f31e8b97139e1dfea37ecf20804741b.exe
Resource
win10v2004-20230220-en
Target
9538530937.zip
Size
50KB
MD5
1e2ed29cf06a7ea3ea71219e3e2e9119
SHA1
7b5e8359ecc0d4e60a01dca17c518a1b7d6e4f72
SHA256
276c8139b67034980f5296940345aa360f7e5bbcdf4d12ef9edef9006f1e433b
SHA512
4b832b3a3ccf639ba7e8527aa42eae87f0b09422a0f0b778f03870b458512ef91e9c15b282f40c9cc7e00686e8b3920cae57ac02373997f512f0cd8fcd51c531
SSDEEP
768:zEsWxFFKicB9+7BAoyIRDRSxgu4+7+ivhoYeMpFGJpdoo6gbetrm/5rxOdZQutA:ze/FKiBr7xRSTVD1eMp8JkrgbetkUztA
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapFree
VirtualProtect
GetProcessHeap
HeapAlloc
GlobalMemoryStatusEx
GetModuleHandleA
GetLastError
CreateProcessA
GetProcAddress
GetCurrentProcess
FreeLibrary
ReadFile
ExitProcess
GetVersionExA
GetTickCount
WinExec
LocalAlloc
LocalSize
LocalFree
GetModuleFileNameA
GetFileAttributesA
CopyFileA
MoveFileExA
CreateDirectoryA
SetFileAttributesA
LoadLibraryA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
lstrcatA
GetLocalTime
GetSystemDirectoryA
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
WriteFile
CreateThread
OutputDebugStringA
lstrcpyA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
VirtualFree
GetStartupInfoA
InterlockedIncrement
InterlockedDecrement
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GetVersion
GetCurrentThreadId
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
GetTopWindow
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetLastInputInfo
GetSystemMetrics
ChangeDisplaySettingsA
FindWindowA
GetClassNameA
GetWindow
GetKeyState
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
wsprintfA
OpenSCManagerA
ChangeServiceConfig2A
UnlockServiceDatabase
StartServiceA
RegOpenKeyA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegQueryValueA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenServiceA
DeleteService
OpenEventLogA
ClearEventLogA
CloseEventLog
CreateServiceA
LockServiceDatabase
SHGetSpecialFolderPathA
ShellExecuteExA
_strcmpi
_stricmp
memcpy
_mbschr
_mbslwr
??3@YAXPAX@Z
ceil
_ftol
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
_mbscmp
rand
exit
strstr
strncpy
strrchr
system
atoi
strcspn
malloc
_except_handler3
memmove
free
_beginthreadex
strchr
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memset
memcmp
_msize
_expand
realloc
_strupr
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
recv
select
closesocket
send
ord17
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xran@std@@YAXXZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
URLDownloadToFileA
InternetGetConnectedState
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
CreateBitmap
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
ScaleWindowExtEx
GetClipBox
OpenPrinterA
DocumentPropertiesA
ClosePrinter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ