Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
Malicious_63b10c3c58b90e8ecf8917a3a285ec5168f0d29d7908ca6471114c3d998db744.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_63b10c3c58b90e8ecf8917a3a285ec5168f0d29d7908ca6471114c3d998db744.exe
Resource
win10v2004-20230621-en
Target
Malicious_63b10c3c58b90e8ecf8917a3a285ec5168f0d29d7908ca6471114c3d998db744.exe
Size
62KB
MD5
86c02a460e46382a6fcdfebac95982be
SHA1
795c6ec001b71a39e0ccb21eb654dc4908d89472
SHA256
63b10c3c58b90e8ecf8917a3a285ec5168f0d29d7908ca6471114c3d998db744
SHA512
02a4025c1517ecbbd0a18a91ac4f4455c4e75ae29abddc2e5736e5c7d8ddb196f4b20f0325e723caba238ce0a9ea7f33f743c0b2b2a70b584c21485cde4e459d
SSDEEP
768:oZPuEV25nexXnEIewmptU9Hj+e7Uvyy1w/bT2A/2E+wkcYhprRoLjAIl0mrAftDB:agRze2yy18bTD5v9r3HulgaKE
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RtlUnicodeStringToInteger
RtlInitAnsiString
DbgPrintEx
RtlGetVersion
KeInitializeGuardedMutex
ExAllocatePoolWithTag
ExFreePoolWithTag
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ZwClose
ZwOpenKey
ZwQueryValueKey
RtlInitializeGenericTableAvl
RtlCompareString
PsSetCreateProcessNotifyRoutine
RtlImageNtHeader
IofCompleteRequest
RtlInitUnicodeString
KeDelayExecutionThread
ProbeForRead
IoGetCurrentProcess
ObfDereferenceObject
KeStackAttachProcess
KeUnstackDetachProcess
PsIsThreadTerminating
PsLookupProcessByProcessId
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
PsGetProcessWow64Process
PsIsProtectedProcess
ZwProtectVirtualMemory
RtlImageDirectoryEntryToData
RtlAnsiStringToUnicodeString
RtlCompareUnicodeString
RtlAppendUnicodeToString
RtlFreeUnicodeString
KeWaitForSingleObject
MmMapLockedPagesSpecifyCache
MmAllocatePagesForMdl
MmFreePagesFromMdl
PsCreateSystemThread
PsTerminateSystemThread
PsWrapApcWow64Thread
ObReferenceObjectByHandle
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
PsGetCurrentThreadId
PsGetProcessId
PsLookupThreadByThreadId
ZwWaitForSingleObject
ZwQuerySystemInformation
ZwQueryInformationThread
PsGetProcessPeb
PsGetThreadTeb
PsGetCurrentProcessWow64Process
KeTestAlertThread
KeInitializeApc
KeInsertQueueApc
__C_specific_handler
PsThreadType
RtlCopyUnicodeString
KeResetEvent
ZwWriteFile
RtlRandomEx
RtlCreateUnicodeString
RtlDowncaseUnicodeString
ZwCreateEvent
ZwDeleteFile
ZwQueryInformationProcess
_vsnwprintf
ExEventObjectType
KeAcquireGuardedMutex
KeReleaseGuardedMutex
MmGetSystemRoutineAddress
RtlCaptureContext
KeCapturePersistentThreadState
ProbeForWrite
MmProbeAndLockPages
MmUnlockPages
MmBuildMdlForNonPagedPool
MmUnmapLockedPages
IoAllocateMdl
IoFreeMdl
ObCloseHandle
ZwOpenFile
RtlInsertElementGenericTableAvl
RtlDeleteElementGenericTableAvl
RtlLookupElementGenericTableAvl
RtlEnumerateGenericTableAvl
RtlIsGenericTableEmptyAvl
PsGetCurrentProcessId
ZwQueryVirtualMemory
MmHighestUserAddress
MmCopyVirtualMemory
ExEnumHandleTable
ExfUnblockPushLock
RtlCompareUnicodeStrings
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ