Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
vboxwrapper_2019052101_windows_x86_64.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
vboxwrapper_2019052101_windows_x86_64.exe
Resource
win10v2004-20230703-en
Target
vboxwrapper_2019052101_windows_x86_64.exe
Size
2.1MB
MD5
65b37d64ce81750e8e8b042f250082e4
SHA1
46307b37292108efb712a93eb9050e5b725b6768
SHA256
835d0eb8497e97628ae3c1c94439ca68c7c3337e7893b47e3878aa4027dae620
SHA512
1aa1f79f8970f800bbc5b6e52938b1412f0a6f7cf271f2a963da78dd3b9173ddfca6d5effe17e9bdc84c01289af2b1faec2877b28d7871f8e3163fb3f95ddae9
SSDEEP
49152:g++UbT7rB4bSGatRO3hg9XNC9VWPsh8HXUwD/:lYatR5XHX
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SetPriorityClass
MultiByteToWideChar
WideCharToMultiByte
GetProcessTimes
GetCurrentThread
GetThreadTimes
GetSystemTimeAsFileTime
CreateMutexA
CreateFileA
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
FindClose
GetTempFileNameA
GetDiskFreeSpaceExA
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
CopyFileA
MoveFileExA
LocalFree
FormatMessageW
ExpandEnvironmentStringsA
SetCurrentDirectoryA
SetUnhandledExceptionFilter
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
GetVersionExA
GetCurrentProcess
OpenThread
GetThreadContext
SuspendThread
IsDebuggerPresent
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ReleaseMutex
WaitForMultipleObjects
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
CreateEventA
CreateFileMappingA
OutputDebugStringA
FreeLibrary
SetLastError
LoadLibraryA
GetModuleFileNameA
GetEnvironmentVariableA
GetCurrentDirectoryA
GetVersion
GetStdHandle
SetFilePointer
GetFileTime
SetFileTime
GetLocalTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
DosDateTimeToFileTime
GetDriveTypeA
GetFullPathNameA
SetFileAttributesA
SetVolumeLabelA
GetVolumeInformationA
GetLocaleInfoA
GetConsoleMode
GetConsoleScreenBufferInfo
SetConsoleMode
GetFileType
SetFileAttributesW
SetEnvironmentVariableA
lstrcmpiA
lstrcpynA
lstrlenA
CreateThread
SetThreadPriority
ResumeThread
EncodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetDriveTypeW
GetCommandLineA
IsProcessorFeaturePresent
ExitThread
LoadLibraryExW
SetConsoleCtrlHandler
GetCPInfo
SetStdHandle
GetFileInformationByHandle
FlushFileBuffers
WriteFile
GetConsoleCP
FatalAppExitA
GetStartupInfoW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
GetModuleFileNameW
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
SetCurrentDirectoryW
GetCurrentDirectoryW
ReadConsoleW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetStringTypeW
MoveFileExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
OutputDebugStringW
GetFullPathNameW
GetFileAttributesExW
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RemoveDirectoryW
CreateDirectoryW
SetEnvironmentVariableW
DeleteFileW
OpenFileMappingA
LocalAlloc
Thread32Next
Thread32First
CreateToolhelp32Snapshot
DebugBreak
RaiseException
GetProcessWorkingSetSize
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
PeekNamedPipe
CreatePipe
SetHandleInformation
ReadFile
Sleep
WaitForSingleObject
TerminateProcess
OpenProcess
CreateProcessA
CloseHandle
GetLastError
GetExitCodeProcess
GetFileAttributesW
GetCurrentProcessId
UnregisterClassA
CharToOemA
OemToCharA
GetClassNameA
GetWindowTextA
GetForegroundWindow
GetWindowThreadProcessId
OleRun
CoCreateInstance
CoInitialize
htons
ioctlsocket
htonl
ntohs
socket
gethostbyname
WSACleanup
WSAGetLastError
getsockopt
getsockname
inet_ntoa
closesocket
bind
WSAStartup
ntohl
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CryptReleaseContext
CryptGenRandom
GetKernelObjectSecurity
OpenProcessToken
AdjustTokenPrivileges
IsValidSid
IsValidAcl
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
SetKernelObjectSecurity
LookupPrivilegeValueA
GetSecurityDescriptorLength
AllocateAndInitializeSid
FreeSid
CryptAcquireContextA
SHGetFolderPathA
CreateErrorInfo
SetErrorInfo
VariantChangeType
VariantClear
VariantInit
GetErrorInfo
SafeArrayGetVartype
SafeArrayUnlock
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayDestroy
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ