Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ISLLightexe.exe
Resource
win7-20230621-en
Target
ISLLightexe.exe
Size
591KB
MD5
0c7b1b300029227ec246a0c51034bcba
SHA1
e3d02142d073267b9e723fe20b8f8cf1ca1446bb
SHA256
9998a13c9765059b9bb6dc9795b5af7d83a575b1994bd455a9cfc890a8f8f055
SHA512
bbb81c66f39789eb64dd67f52c3c5cb40ce50c4e89bda40fbc5751ff4e796779c16b8257a15e930ee318b8b36d1995a89f05149475a43da346849c18f6e3ca70
SSDEEP
12288:j9m4MBiB/6tV1C8tCeRuaqRK2opT7sQ2qN+VN6BUzNt6Oa4n5I:j9m4PBStV/CeHqRKj7R2K+OGt6In+
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenEventA
Sleep
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
GetVersion
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
GetModuleHandleA
GetProcAddress
FormatMessageA
CreateFileMappingA
DuplicateHandle
SetLastError
GetVersionExA
FreeLibrary
LoadLibraryA
IsBadReadPtr
lstrcmpA
lstrcpyA
lstrcatA
lstrlenA
SetCurrentDirectoryA
SetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
CreateEventA
FindFirstFileW
FindNextFileA
FindNextFileW
GetFileAttributesA
GetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
SetFileAttributesA
SetFileAttributesW
GetModuleFileNameA
GetModuleFileNameW
MoveFileA
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetCommandLineW
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
CreateProcessA
CreateProcessW
LoadLibraryW
WaitForSingleObject
CreateThread
SetEvent
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
CloseHandle
SetFilePointer
GetFileSize
FindFirstFileA
FindClose
MessageBoxA
MsgWaitForMultipleObjects
ShowWindow
RegisterClassA
DefWindowProcA
PeekMessageA
DispatchMessageA
CreateWindowExA
ShellExecuteExA
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
RegCloseKey
RegOpenKeyExA
RegQueryValueExW
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ