Extended Key Usages
ExtKeyUsageCodeSigning
05-07-2023 13:23
230705-qnby2acf23 10Static task
static1
Behavioral task
behavioral1
Sample
03246cda354d8efbc9e22057c.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
03246cda354d8efbc9e22057c.exe
Resource
win10v2004-20230703-en
Target
03246cda354d8efbc9e22057c.exe
Size
1.1MB
MD5
32126de1466136e0b4f39560f3956fb9
SHA1
1f2b679904a40552d24d430529e70c916504aef4
SHA256
03246cda354d8efbc9e22057cc283609825f15cf33ddc5296deac54c2b540218
SHA512
50b49d35e8953584e1dc3a9263093ef1be4f75ac6daec1eb18d649ff9228d819166aa0949f9f0f336354ce10ad7f5a71295b1704b86f311c0e3afebbbc9905ec
SSDEEP
24576:o67iOScr1wsPJ0L9V/QvZzvG7L6U0Bshunf:o67iO3isPJ0LSvQ5hunf
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFilePointerEx
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
VirtualAlloc
SetErrorMode
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
SetEvent
HeapReAlloc
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
HeapFree
VirtualFree
HeapCreate
InterlockedDecrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
ExitProcess
GetCommandLineA
SetEnvironmentVariableW
QueryPerformanceCounter
OpenEventW
MultiByteToWideChar
LocalFree
LocalAlloc
LoadLibraryW
IsDebuggerPresent
InterlockedIncrement
InterlockedExchange
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetVolumeInformationW
GetTimeZoneInformation
GetTimeFormatW
GetTickCount
GetSystemTimeAsFileTime
GetStdHandle
GetStartupInfoA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetEnvironmentStringsW
GetFileType
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
GetAtomNameA
FreeLibrary
FreeEnvironmentStringsW
FormatMessageW
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
CreateThread
CreateMutexW
CreateHardLinkA
CreateEventW
RtlUnwind
CloseHandle
LoadCursorW
LoadIconA
keybd_event
UnregisterHotKey
UnhookWindowsHookEx
ShowCaret
SetWindowsHookExW
SetProcessDefaultLayout
SetKeyboardState
SetForegroundWindow
SetDeskWallpaper
SendDlgItemMessageW
RegisterWindowMessageW
RegisterHotKey
PostMessageW
OemToCharW
MapVirtualKeyExA
LoadStringW
IsCharAlphaNumericA
InvertRect
InvalidateRect
GetWindowThreadProcessId
GetWindowRgn
GetUpdateRect
GetMonitorInfoW
GetMenuState
GetLastActivePopup
GetKeyState
GetForegroundWindow
GetDlgItemTextW
GetDlgItem
GetClipboardSequenceNumber
GetAsyncKeyState
EnumDisplayMonitors
EndDialog
EnableWindow
DlgDirListW
DialogBoxParamW
DestroyIcon
CharUpperW
CallNextHookEx
AttachThreadInput
wsprintfW
SetDIBitsToDevice
SetDCPenColor
SetDCBrushColor
STROBJ_bGetAdvanceWidths
RoundRect
Polyline
PolyTextOutA
Pie
GetWinMetaFileBits
GetMetaFileW
GetMetaFileA
GetLogColorSpaceA
GetDIBits
GetDCBrushColor
GetArcDirection
GdiPlayEMF
GdiEntry16
GdiConvertEnhMetaFile
ExcludeClipRect
EngDeleteSemaphore
EngComputeGlyphSet
EngCheckAbort
DeviceCapabilitiesExW
DeleteObject
CreateColorSpaceA
SetFontEnumeration
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyW
RegOpenKeyExW
RegEnumValueW
RegConnectRegistryW
RegCloseKey
OpenServiceW
OpenSCManagerW
OpenProcessToken
ControlService
CloseServiceHandle
RegOpenKeyExA
SHGetFolderPathW
SHGetFileInfoW
ExtractIconExW
CommandLineToArgvW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ