Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
wrapper_2022110901_windows_x86_64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
wrapper_2022110901_windows_x86_64.exe
Resource
win10v2004-20230220-en
Target
wrapper_2022110901_windows_x86_64.exe
Size
1.2MB
MD5
584600e9da069df449090da79bd3196e
SHA1
5577bea53a40890c8168f7c2aae76200479154fb
SHA256
fcddff127308a6c7ced47c25fb695769abaa1eab80ba7d18701454a8a6d8272f
SHA512
8e191659f2ffd90b74c316fa392feb514e73d7a5a7868f438e6753c29bd2a1d1d1fa295a171003b201e29f6b0cf91582c709f076e9cfa830acb3540a0c927f89
SSDEEP
24576:mF8A16d77HCOt9bFCdGtW0BXFzmWp7BWJpljmUeslq240AJL:mFN16d77HTtRFZW03zmWp7BWJpljm/Oq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
MoveFileExA
OpenProcess
GetCurrentProcessId
TerminateProcess
OpenThread
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Thread32First
Thread32Next
LocalFree
FormatMessageW
ExpandEnvironmentStringsA
SetCurrentDirectoryA
MultiByteToWideChar
WideCharToMultiByte
GetProcessTimes
GetCurrentThread
GetThreadTimes
DebugBreak
WaitForSingleObject
Sleep
GetSystemTimeAsFileTime
CreateMutexA
GetModuleFileNameA
GetProcAddress
HeapAlloc
HeapFree
GetProcessHeap
GetModuleHandleA
GetVersionExA
GetCurrentThreadId
GetThreadContext
IsDebuggerPresent
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ReleaseMutex
WaitForMultipleObjects
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
CreateEventA
CreateFileMappingA
OutputDebugStringA
FreeLibrary
SetLastError
LoadLibraryA
GetEnvironmentVariableA
SetUnhandledExceptionFilter
GetVersion
GetStdHandle
ReadFile
GetFileTime
SetFileTime
GetLocalTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
DosDateTimeToFileTime
GetDriveTypeA
GetFullPathNameA
SetFileAttributesA
SetVolumeLabelA
GetVolumeInformationA
GetLocaleInfoA
GetConsoleMode
GetConsoleScreenBufferInfo
SetConsoleMode
GetFileType
SetFileAttributesW
GetFileAttributesW
lstrcmpiA
CopyFileA
lstrlenA
CreateThread
SetThreadPriority
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
IsProcessorFeaturePresent
SetStdHandle
GetCommandLineA
GetDriveTypeW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
HeapReAlloc
ExitThread
LoadLibraryExW
SetConsoleCtrlHandler
HeapSize
GetCPInfo
GetFileInformationByHandle
PeekNamedPipe
IsValidCodePage
GetACP
GetOEMCP
WriteFile
GetModuleFileNameW
FatalAppExitA
GetStartupInfoW
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleCP
CreateFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTimeZoneInformation
ReadConsoleW
FlushFileBuffers
GetStringTypeW
CreatePipe
MoveFileExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
OutputDebugStringW
GetFullPathNameW
WriteConsoleW
SetEnvironmentVariableA
GetFileAttributesExW
FindNextFileA
FindFirstFileA
RemoveDirectoryW
CreateDirectoryW
SetEnvironmentVariableW
DeleteFileW
OpenFileMappingA
DeleteFileA
GetCompressedFileSizeA
GetFileAttributesA
RemoveDirectoryA
CreateDirectoryA
GetDiskFreeSpaceExA
GetTempFileNameA
CloseHandle
FindClose
SetFilePointerEx
SetEndOfFile
GetFileSizeEx
GetCurrentDirectoryA
GetLastError
CreateProcessA
GetExitCodeProcess
GetCurrentProcess
SetFilePointer
SetPriorityClass
lstrcpynA
LocalAlloc
CreateFileA
CharToOemA
GetClassNameA
GetWindowTextA
GetForegroundWindow
GetWindowThreadProcessId
OemToCharA
SetEntriesInAclA
GetSecurityDescriptorLength
LookupPrivilegeValueA
SetKernelObjectSecurity
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
IsValidSecurityDescriptor
IsValidAcl
IsValidSid
AdjustTokenPrivileges
OpenProcessToken
GetKernelObjectSecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
AllocateAndInitializeSid
FreeSid
SHGetFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ