Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
10Static
static
3AutoUpdater.NET.dll
windows10-1703-x64
1AutoUpdater.NET.dll
windows10-2004-x64
1BCware.exe
windows10-1703-x64
10BCware.exe
windows10-2004-x64
10Octokit.dll
windows10-1703-x64
1Octokit.dll
windows10-2004-x64
1QueryMaster.dll
windows10-1703-x64
1QueryMaster.dll
windows10-2004-x64
1bypass/spoofer.dll
windows10-1703-x64
bypass/spoofer.dll
windows10-2004-x64
1bypass/winload.dll
windows10-1703-x64
1bypass/winload.dll
windows10-2004-x64
1libSoftMeter.dll
windows10-1703-x64
1libSoftMeter.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
AutoUpdater.NET.dll
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
AutoUpdater.NET.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
BCware.exe
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
BCware.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Octokit.dll
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
Octokit.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
QueryMaster.dll
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
QueryMaster.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
bypass/spoofer.dll
Resource
win10-20230220-en
Behavioral task
behavioral10
Sample
bypass/spoofer.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
bypass/winload.dll
Resource
win10-20230220-en
Behavioral task
behavioral12
Sample
bypass/winload.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
libSoftMeter.dll
Resource
win10-20230220-en
Behavioral task
behavioral14
Sample
libSoftMeter.dll
Resource
win10v2004-20230220-en
Target
BCware.zip
Size
2.3MB
MD5
446f391e3843afb91af7256d690f1b5e
SHA1
9f97c53fbbe043d77110276706228e8abbc493a3
SHA256
23fb2c036a7d286beff48a7ca3330c5d1f82e599d68ba1dad8bd4f02d5e8d79a
SHA512
a1bdd7834966aa92378f9785a4f3759d88eb84ce4aa52db6e0a4d910e00b8b502d1e1817283656db862645dc05a9dcbe3c7909920bc7ca4aea0d3a4ad000956c
SSDEEP
49152:auIqrYRNXoq9JlZXXSIUlNyVzOMQ91NNHxKyzPdDQXQM3GNn9:s8YR1oUpXXSGkMQ93Kyts32Nn9
Checks for missing Authenticode signature.
resource |
---|
unpack001/AutoUpdater.NET.dll |
unpack001/BCware.exe |
unpack001/Octokit.dll |
unpack001/QueryMaster.dll |
unpack001/libSoftMeter.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLastError
SetLastError
FormatMessageW
GetCurrentProcess
DeviceIoControl
SetFileTime
CloseHandle
CreateDirectoryW
RemoveDirectoryW
CreateFileW
DeleteFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
GetFileType
GetStdHandle
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
FindNextFileW
InterlockedDecrement
GetVersionExW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
GetModuleFileNameW
GetModuleHandleW
FindResourceW
FreeLibrary
GetProcAddress
GetCurrentProcessId
ExitProcess
SetThreadExecutionState
Sleep
LoadLibraryW
GetSystemDirectoryW
CompareStringW
AllocConsole
FreeConsole
AttachConsole
WriteConsoleW
GetProcessAffinityMask
CreateThread
SetThreadPriority
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventW
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
LockResource
GlobalLock
GlobalUnlock
GlobalFree
LoadResource
SizeofResource
SetCurrentDirectoryW
GetExitCodeProcess
GetLocalTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetCommandLineW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
MoveFileExW
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
DecodePointer
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
LocalFree
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
QueryPerformanceFrequency
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
HeapReAlloc
GetStringTypeW
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
SysAllocString
SysFreeString
VariantClear
GdipAlloc
GdipDisposeImage
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdiplusShutdown
GdipFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
FormatMessageA
GetUserDefaultUILanguage
GetLocaleInfoA
GetComputerNameA
GetNativeSystemInfo
GetSystemTimeAsFileTime
GetModuleFileNameA
LoadLibraryA
GetFileAttributesA
CreateDirectoryA
OutputDebugStringA
WideCharToMultiByte
HeapSize
SetEndOfFile
WriteConsoleW
GetProcessHeap
GetTempPathA
GetLastError
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
ReadFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
MultiByteToWideChar
CloseHandle
WaitForSingleObjectEx
Sleep
GetCurrentProcess
SwitchToThread
GetCurrentThread
GetCurrentThreadId
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetThreadTimes
LoadLibraryExW
InterlockedFlushSList
RtlUnwind
RaiseException
GetTempPathW
CreateFileW
GetFileType
GetModuleHandleExW
ExitProcess
HeapAlloc
HeapFree
GetACP
GetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
GetFileAttributesExW
FlushFileBuffers
DeleteFileW
GetDateFormatW
GetTimeFormatW
GetSystemMetrics
GetUserNameA
SHGetFolderPathA
WinHttpCloseHandle
WinHttpSetStatusCallback
WinHttpCheckPlatform
WinHttpOpen
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpConnect
WinHttpReceiveResponse
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetCheckConnectionA
InternetOpenUrlA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
aio_sendEvent
aio_sendEvent_stdcall
disableLogfile
disableLogfile_stdcall
enableLogfile
enableLogfile_stdcall
getLogFilename
getLogFilename_stdcall
getVersion
getVersion_stdcall
latDisableLogfile
latEnableLogfile
latFree
latGetLogFilename
latGetVersion
latInit
latSendEvent
latSendException
latSendPageview
latSendScreenview
sendEvent
sendEvent_stdcall
sendException
sendException_stdcall
sendPageview
sendPageview_stdcall
sendScreenview
sendScreenview_stdcall
setSubscription
setSubscription_stdcall
start
start_stdcall
stop
stop_stdcall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ