Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
jweblauncher.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
jweblauncher.exe
Resource
win10v2004-20230220-en
Target
jweblauncher.exe
Size
283KB
MD5
41273b87820b9404a3d692f0f95762fb
SHA1
593657caa95658599b0dcc66340230912c6112c1
SHA256
de00222fff35eb3ae8b8ddbc9f725d2edaffb49499be5c0813bda3b38c4c3fdf
SHA512
46867d4fcc6442330aa6f2e8202903edc55e2831c9b22e576aa84e65a768303ae1815364dc972b40d63574b0c3812f81197cf1e8489d1ad449580daa350f98cc
SSDEEP
6144:OcKFB5DUwQwUOosg1e+i/UCsBsST505NZ6rNbK4pv04w:OcKFBWwQVs4exaspQrNbrv0p
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VerSetConditionMask
GetEnvironmentVariableA
CreateFileA
GetLongPathNameA
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
GetCurrentProcess
CreateProcessA
OpenProcess
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetNativeSystemInfo
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
GetShortPathNameA
FormatMessageA
lstrlenA
LoadLibraryA
GetTempPathA
VerifyVersionInfoA
GetFileAttributesA
GetSystemWindowsDirectoryA
GetExitCodeProcess
GetModuleHandleExA
GetCurrentProcessId
FindClose
FindFirstFileA
OutputDebugStringA
GetCurrentThreadId
SetStdHandle
SetEnvironmentVariableA
FlushFileBuffers
GetFileInformationByHandle
SetEvent
CreateEventA
Sleep
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
WriteConsoleW
ReadConsoleW
SetEndOfFile
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
LoadLibraryExA
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
EncodePointer
IsProcessorFeaturePresent
HeapFree
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlLookupFunctionEntry
RtlUnwindEx
RtlPcToFileHeader
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetTimeZoneInformation
HeapReAlloc
GetCommandLineA
HeapSize
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcessHeap
SetEnvironmentVariableW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStdHandle
GetFileType
FileTimeToLocalFileTime
PeekNamedPipe
GetFullPathNameW
GetCurrentDirectoryW
CreateFileW
WriteFile
GetConsoleCP
GetConsoleMode
GetModuleFileNameW
GetFileAttributesExW
LoadLibraryExW
ReadFile
SetFilePointerEx
QueryPerformanceCounter
CloseDesktop
OpenInputDesktop
wsprintfA
GetWindowThreadProcessId
GetShellWindow
CoTaskMemFree
StringFromCLSID
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ