Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
Malicious_8d0e4211701deb6da6ad5eee039f6e882ebf07e18278dc88ca3f25018e008acc.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_8d0e4211701deb6da6ad5eee039f6e882ebf07e18278dc88ca3f25018e008acc.dll
Resource
win10v2004-20230621-en
Target
Malicious_8d0e4211701deb6da6ad5eee039f6e882ebf07e18278dc88ca3f25018e008acc.exe
Size
64KB
MD5
b3c064a66b512ec7813677ac263ea8a3
SHA1
0a93c2cf03caa547b5ac91e65ab6bdc7228b0a8e
SHA256
8d0e4211701deb6da6ad5eee039f6e882ebf07e18278dc88ca3f25018e008acc
SHA512
97d9a243c8c3471e76a4b3e8ba3259c13d5cde952f2bc93c2a04e9b719b80e6934fa9a9293e8e52ef79e714e31744f639a4df4adecfa166507553da3c712c5df
SSDEEP
1536:UwRu5poFWWFoOHqvhk0QCXrUH/LT/nPp/d651DSSqOXP:UwRKpoFWQoOHqvhkW4LT/nPp/d651+St
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
LocalFree
GetModuleFileNameA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
CreateThread
GetProcAddress
LoadLibraryA
UnmapViewOfFile
Sleep
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
MultiByteToWideChar
FlushViewOfFile
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
CloseHandle
InitializeCriticalSectionAndSpinCount
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
GetCurrentThreadId
FlsSetValue
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetLastError
HeapFree
HeapAlloc
RaiseException
RtlPcToFileHeader
EncodePointer
DecodePointer
FlsGetValue
FlsFree
SetLastError
FlsAlloc
GetModuleHandleW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapSetInformation
HeapCreate
HeapDestroy
RtlUnwindEx
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
WriteFile
LeaveCriticalSection
GetClassNameA
SendMessageA
EnumChildWindows
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
GetPropA
SetPropA
IsWindow
RegisterWindowMessageA
SendMessageTimeoutA
FindWindowExA
GetWindowThreadProcessId
GetSecurityDescriptorSacl
SetSecurityInfo
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
CoInitialize
VariantInit
SysAllocString
SysFreeString
ObjectFromLresult
timeGetTime
EnableLock
LoadStartupPage
SaveStartupPage
StartHook
UnLoadHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ