Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
b7f8e52f54aec8ed88d83bbe0c1ef28f5c77a34a9d4114366aad2db05680b485.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b7f8e52f54aec8ed88d83bbe0c1ef28f5c77a34a9d4114366aad2db05680b485.exe
Resource
win10v2004-20230703-en
Target
b7f8e52f54aec8ed88d83bbe0c1ef28f5c77a34a9d4114366aad2db05680b485
Size
638KB
MD5
d73a8341cc01317d679c3615b12ef0d2
SHA1
d485b35ca2199410656780be2226edeaaee3fdec
SHA256
b7f8e52f54aec8ed88d83bbe0c1ef28f5c77a34a9d4114366aad2db05680b485
SHA512
d6b9bef5c71091b0ac26f03e148e47a7c727c53399100c2b35b50b9da567c1595123e0d5c5114b8d8250c10600bf39432f710471e17e3ff86fda9f829ab0883b
SSDEEP
6144:w8E9PwhHpWBwRxKLgTtkevrDg29PRMtOf:E9LBwfnZqOf
metasploit
encoder/shikata_ga_nai
metasploit
windows/reverse_tcp
172.29.218.106:4444
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VerSetConditionMask
VerifyVersionInfoW
FindFirstFileW
FindNextFileW
GetCurrentProcess
GetShortPathNameW
TerminateProcess
GetModuleFileNameW
FindClose
LocalAlloc
GetFileAttributesW
GetSystemDirectoryW
GetPrivateProfileStringW
Sleep
GetLastError
CloseHandle
LoadLibraryW
GetProcAddress
GetModuleHandleW
FreeLibrary
SetDllDirectoryW
WriteConsoleW
CreateFileW
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetSystemInfo
GetModuleHandleA
LocalFree
GetVersionExW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
GetCurrentThreadId
WaitForSingleObjectEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
LCMapStringW
GetSystemMetrics
MessageBoxW
FindWindowW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHCreateDirectoryExW
ShellExecuteW
CoTaskMemFree
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
PathFileExistsW
PathRemoveFileSpecW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ