Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
01.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
01.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
03.dll
Resource
win7-20230703-en
Target
39FDC2EEEC6.zip
Size
16.9MB
MD5
0b3304a2ed77167768b2ff1226d77d85
SHA1
a2672d52cf5de6184de0d5e67684cda9c2781334
SHA256
caef7d5da7dcb70dd811a1e4085e6760e5b0823d6ead1d4a7cc117b72c0dd595
SHA512
e8b92653ad942d759bc48f30f5a08aaba86ae770a7ef4deefb13628c447c069fe85aa53ca5e8e8f4a7cfece23751eacea78a702747b64497443a814c14dfa2b8
SSDEEP
393216:hlMJSv4rtu7rPPxYdGNhlfxDJbMv7ZREDBpQ1ply/JxCo:hloufrhlxDto7ZRMeDy/JxCo
resource | yara_rule |
---|---|
static1/unpack001/03 | themida |
Checks for missing Authenticode signature.
resource |
---|
unpack001/03 |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
CompareStringA
CompareStringW
TerminateThread
WaitForSingleObject
CreateThread
ReadFile
CloseHandle
DeviceIoControl
CreateEventA
ResetEvent
WaitForMultipleObjects
SetEvent
InitializeCriticalSection
CreatePipe
RaiseException
PeekNamedPipe
GetFileInformationByHandle
GetProcessHeap
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapFree
VirtualFree
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetEndOfFile
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetProcAddress
Sleep
GetModuleHandleW
IsDebuggerPresent
GetCurrentProcess
UnhandledExceptionFilter
TerminateProcess
GetCurrentDirectoryA
EnterCriticalSection
SetUnhandledExceptionFilter
SetEnvironmentVariableA
GetModuleHandleA
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetFullPathNameW
FindFirstFileW
GetDriveTypeW
CreateFileW
DeleteFileW
CreateDirectoryW
GetFileAttributesW
LocalFree
FormatMessageW
OutputDebugStringW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileAttributesA
GetVersionExA
FindClose
VirtualQuery
GetDriveTypeA
InterlockedCompareExchange
GetStartupInfoW
CreateWindowExW
DispatchMessageA
GetMessageA
PostMessageA
MsgWaitForMultipleObjects
PeekMessageA
DestroyWindow
PostThreadMessageA
OpenServiceW
ReportEventW
RegSetValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyExW
RegQueryValueExW
StartServiceCtrlDispatcherA
RegCloseKey
RegisterServiceCtrlHandlerA
RegisterEventSourceA
DeregisterEventSource
SetServiceStatus
CloseServiceHandle
OpenSCManagerW
setsockopt
socket
bind
accept
closesocket
sendto
ntohs
WSAStartup
WSAGetLastError
inet_addr
ntohl
listen
getsockopt
ioctlsocket
getsockname
htonl
htons
WSAAsyncSelect
send
shutdown
recv
WSAIoctl
connect
getpeername
recvfrom
WSACreateEvent
CancelIPChangeNotify
NotifyAddrChange
GetAdaptersAddresses
GetAdaptersInfo
DnsFree
DnsQuery_A
SHGetFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CallFormPrincipal
SHGetFolderPathW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE