Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.dll
Resource
win10v2004-20230621-en
Target
Malicious_91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045.exe
Size
92KB
MD5
f5fb96b6c7470634944e03a4b59199f4
SHA1
4860413541639d4ffaab1e533d64ccef62184484
SHA256
91c9164bfd8c713f4c8fba7e88f8d0aca0b51f717cc7c4691c868f5783088045
SHA512
62bf54b134997016d25f6ffc765b197e84fe7eb8a331ec41076223678b74bae21bfd6835e48b51b5c9599a6288ed66a9b4b22a1ce2bd0a8463fe5523fa47fb03
SSDEEP
1536:DONx3L4A01nkldK+gXavCg57J/up+ptdC90:DOX4nnAthd5w+pto
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrlenW
lstrcatA
lstrcmpiW
CompareFileTime
SystemTimeToFileTime
GetLocalTime
CreateThread
DebugBreak
HeapReAlloc
HeapFree
DeleteFileA
CloseHandle
FlushFileBuffers
WriteFile
CreateFileA
SetLastError
InterlockedDecrement
EnterCriticalSection
LocalFree
SetThreadPriority
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
lstrcpyA
ResumeThread
ResetEvent
UnmapViewOfFile
CreateMutexA
CreateFileMappingA
ReleaseMutex
SetEvent
GetCommandLineA
GetFileSize
ReadFile
GetDriveTypeA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
WaitForMultipleObjects
WaitForSingleObject
GetCurrentProcessId
lstrcmpA
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetTickCount
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
WritePrivateProfileSectionA
CreateDirectoryA
MapViewOfFile
CharNextA
SetTimer
DestroyWindow
EnumWindows
GetClassNameA
GetWindowThreadProcessId
PostMessageA
IsWindow
PeekMessageA
DefWindowProcW
SetWindowLongA
CallWindowProcW
CallWindowProcA
CreateWindowExA
DefWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
GetKeyboardType
UnregisterClassA
KillTimer
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegFlushKey
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VariantChangeTypeEx
SysStringByteLen
VariantInit
VariantClear
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ