Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4b4698b05cfe466d02c3db199a5e78f68514f4dd16a811868e89337e2b05f888.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4b4698b05cfe466d02c3db199a5e78f68514f4dd16a811868e89337e2b05f888.exe
Resource
win10v2004-20230220-en
Target
4b4698b05cfe466d02c3db199a5e78f68514f4dd16a811868e89337e2b05f888
Size
2.1MB
MD5
b25750fb5960e1aa869aefb9c668e375
SHA1
c7172236d9a19a1c549632fbf1d848608fe85068
SHA256
4b4698b05cfe466d02c3db199a5e78f68514f4dd16a811868e89337e2b05f888
SHA512
0f5ae758a7168bfd823f71a4baba0500533564f618cc28afae0b56dedb328567de67650fff0c505791de31fd0bda2aa558aa61a7f060eb104ea52b7ec7217bdc
SSDEEP
49152:BRQKijKgoO+ynqGy3kz4zly93fr1E3KGTttJITwxZHAmTjifkiS70:BKKijKgobynqGGcj5E36wxJz0
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=91310115591679552Q,CN=Shanghai 2345 Mobile Technology Co.\, Ltd.,O=Shanghai 2345 Mobile Technology Co.\, Ltd.,ST=Shanghai,C=CN,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#13085368616e67686169,1.3.6.1.4.1.311.60.2.1.3=#1302434e
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
LoadResource
FindResourceW
GetProcAddress
GetModuleHandleW
FreeLibrary
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
IsBadStringPtrW
WriteProcessMemory
WaitForSingleObject
OpenProcess
CreateEventW
SetEvent
LoadLibraryA
ResetEvent
VirtualAllocEx
CreateRemoteThread
VirtualFreeEx
OpenMutexW
QueryDosDeviceW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
GetUserDefaultLangID
WriteFile
CreateFileW
GetModuleHandleExW
CreateMutexW
MultiByteToWideChar
GetCurrentProcessId
HeapAlloc
LocalFree
GetProcessHeap
CreateDirectoryW
GetWindowsDirectoryW
ReadFile
SetFilePointer
SetEndOfFile
Sleep
DeleteFileW
GetFileSize
GetTickCount
InterlockedExchange
SetLastError
InterlockedExchangeAdd
lstrlenW
LoadLibraryW
GlobalMemoryStatusEx
ExpandEnvironmentStringsW
GetVersionExW
GetFileAttributesW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCurrentThreadId
LeaveCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
InterlockedDecrement
EnterCriticalSection
SizeofResource
DeleteCriticalSection
DecodePointer
RaiseException
CloseHandle
GetLastError
SetErrorMode
InitializeCriticalSectionAndSpinCount
WriteConsoleW
ReleaseMutex
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
LockResource
GetSystemInfo
SearchPathW
GetCurrentProcess
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ResumeThread
OpenEventW
GetACP
WideCharToMultiByte
GetVolumeInformationW
GetDiskFreeSpaceW
GetDriveTypeW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
TryEnterCriticalSection
InitializeCriticalSection
FindNextFileW
FindClose
LocalFileTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
HeapFree
GetComputerNameExW
GlobalAlloc
GlobalFree
SetFileTime
GetFileTime
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
SetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
MoveFileExW
CopyFileW
GetTempFileNameW
MoveFileW
DeviceIoControl
lstrcatW
lstrcpyW
GetFileSizeEx
CreateProcessW
GetExitCodeProcess
FormatMessageW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlCaptureContext
ReleaseSemaphore
GetProcessId
SuspendThread
TerminateThread
CreateThread
GetThreadContext
CreateSemaphoreW
OpenThread
VirtualQueryEx
SetNamedPipeHandleState
DuplicateHandle
TransactNamedPipe
WaitNamedPipeW
GetStdHandle
GetFileType
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
HeapSize
HeapReAlloc
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
UnregisterClassW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
PostThreadMessageW
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
ReportEventW
RegisterEventSourceW
DeregisterEventSource
SetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
AddAccessAllowedAce
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
SHGetFolderPathW
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
VarUI4FromStr
SysFreeString
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ