Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
10420541033.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10420541033.7z
Resource
win10v2004-20230221-en
Target
10420541033.7z
Size
485KB
MD5
6c1f622da0ad98aa4481bc89da431318
SHA1
7bb2b919387519be510446f6590108ca199a8468
SHA256
ddb7d9a6adad0668832cacc825c523ca0a89e5abb01f1279d9c12dfd5d6653dd
SHA512
eb16e7bfbc27dae51ddf843d266a63593937f2409afb058deca3e25e29a4eab894659b5ea8a8f155d45442a49cce18927db45e9d8433da19785bd61590b4633b
SSDEEP
12288:3ym5oB5XD2aCEW79QeHRm3prSOiKq/I3EmloP9:be5XD2NE26eEFSOiKq/I0mlW9
Processes:
resource | yara_rule |
---|---|
static1/unpack001/c0f8aeeb2d11c6e751ee87c40ee609aceb1c1036706a5af0d3d78738b6cc4125.dll | family_truebot |
Checks for missing Authenticode signature.
Processes:
resource |
---|
unpack001/baaf1d0902f454dd96589202d4f0c513b0941191fae3bddb27a207fed27d9fa8.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
LoadLibraryExA
Sleep
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
SetUnhandledExceptionFilter
CreateFileW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
CloseHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetStringTypeW
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
CN=Marts GmbH,O=Marts GmbH,ST=Steiermark,C=AT
CN=Sectigo Public Code Signing CA R36,O=Sectigo Limited,C=GB
CN=Sectigo Public Code Signing Root R46,O=Sectigo Limited,C=GB
CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WriteProcessMemory
EraseTape
GetCommandLineW
GetCurrentProcess
GetConsoleOutputCP
GetThreadErrorMode
GetModuleHandleExW
GetShortPathNameW
OutputDebugStringA
GetUserDefaultLangID
GetModuleFileNameW
GetUserDefaultUILanguage
GetEnvironmentVariableW
GetLargePageMinimum
CreateMutexA
WaitForSingleObject
UnregisterApplicationRecoveryCallback
IsSystemResumeAutomatic
GetACP
OpenProcess
GetCommandLineA
OutputDebugStringW
CreateFileA
GetUserDefaultLCID
DisableThreadLibraryCalls
GetCurrentThread
GetActiveProcessorGroupCount
CreateThreadpoolCleanupGroup
FreeConsole
CreateThread
GetProcAddress
VirtualAllocEx
WTSGetActiveConsoleSessionId
CreateProcessW
GetEnvironmentStrings
GetOEMCP
CloseHandle
WriteFile
lstrcatA
ReadFile
FindFirstFileA
GetVersionExA
GetSystemInfo
VerSetConditionMask
GetModuleHandleW
VerifyVersionInfoW
HeapFree
ProcessIdToSessionId
GetLastError
HeapAlloc
GetProcessHeap
Process32First
Process32Next
LocalFree
CreateFileW
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
GetLogicalDrives
GetConsoleAliasExesLengthW
AreFileApisANSI
lstrcpyA
GlobalAlloc
lstrlenA
lstrcpyW
ConvertFiberToThread
ExitProcess
Process32FirstW
lstrcatW
LoadLibraryA
Process32NextW
Sleep
GetSystemWow64DirectoryW
CreateToolhelp32Snapshot
GetSystemDirectoryW
GetComputerNameExA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetFileType
GetStdHandle
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
InterlockedFlushSList
RtlUnwindEx
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
CharUpperA
wsprintfA
CloseClipboard
GetDesktopWindow
wsprintfW
ImpersonateLoggedOnUser
RevertToSelf
CreateProcessAsUserW
DuplicateTokenEx
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
GetUserNameW
SHGetSpecialFolderPathA
ShellExecuteW
CoCreateGuid
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoInitialize
CoUninitialize
VariantClear
SysAllocString
SysFreeString
VariantInit
CreateEnvironmentBlock
DestroyEnvironmentBlock
StrChrA
StrStrA
WSACleanup
closesocket
gethostbyname
recv
send
htons
connect
socket
WSAStartup
NetApiBufferFree
NetWkstaGetInfo
ChkdskExs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ