Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Malicious_6f3c32706b7c12a7a5d8dae51230d0232e09b86bb3a9cf1675ab305cb6e12d69.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_6f3c32706b7c12a7a5d8dae51230d0232e09b86bb3a9cf1675ab305cb6e12d69.dll
Resource
win10v2004-20230621-en
Target
Malicious_6f3c32706b7c12a7a5d8dae51230d0232e09b86bb3a9cf1675ab305cb6e12d69.exe
Size
55KB
MD5
8c8b21444b94e2e1e30a953b4640a5a0
SHA1
4a9ea38312f8c566e770bfc12e8fe3d1dc93d5ed
SHA256
6f3c32706b7c12a7a5d8dae51230d0232e09b86bb3a9cf1675ab305cb6e12d69
SHA512
a2e97bc6b4277563558cc6ff0e5d209886f11009d28a5772aa94a5ce49967e28f422b3ee06fc0f24d61b1ba0125752a936299625f47f222ef6106576c38170ee
SSDEEP
768:hukyDwjasje1wrZMN2w/OfMjTgmFhyvLixUVbC90LK:aQjjOwre/OgTnoTB9C90u
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
VirtualProtect
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
lstrlenW
InterlockedIncrement
CloseHandle
GetLastError
CreateEventW
SetLastError
InterlockedDecrement
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DisableThreadLibraryCalls
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
DebugBreak
HeapReAlloc
HeapFree
LocalFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
VariantCopy
VariantClear
VariantInit
SysFreeString
SysAllocString
VariantChangeTypeEx
AppendMenuW
AppendMenuA
wsprintfA
DestroyWindow
SetWindowLongA
CreateWindowExA
DefWindowProcA
RegisterClassExA
UnregisterClassA
LoadCursorA
GetClassInfoExA
DestroyMenu
CreatePopupMenu
GetMenuItemCount
IsMenu
DefWindowProcW
CallWindowProcW
CallWindowProcA
SetWindowLongW
GetWindowLongA
GetWindowLongW
CharNextA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ