Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Target
Malware-3.zip
Size
701KB
MD5
9ab8b5d290ee9f9e73cd72a386a40910
SHA1
f17913b4e099c1571daada4ba61a96bb9167fbfe
SHA256
0a55a372435b0ecbaffa119d72bbeb8f44a1d6301b3964cdaecccb8fccfc29a9
SHA512
eacfa202a7d71b7c39283a3d6b62dc7b8fd6614716d33b902a0ce4990ff274c0df4b29d3e308d432e7216305a0ecb8eb0e8d5656dec341806d0bb2c8bae098d5
SSDEEP
12288:mQYmr1mdlsG7Zn2c8sZC/OD8eFxKaq3pO2gAUkLyKZ9iD/BzsYAEBiWnRomKVqTs:zjr1mln79ZC/O4e/MgAvLy6YDquBvnoP
Checks for missing Authenticode signature.
resource |
---|
unpack001/UMPDC.dll |
unpack001/hollows_hunter64.exe |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_register_thread_local_exe_atexit_callback
_c_exit
_initterm_e
_initterm
_o__get_wide_winmain_command_line
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__purecall
_o__register_onexit_function
_o__resetstkoflw
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
memmove
_o__exit
_o_exit
_o_terminate
__C_specific_handler
__CxxFrameHandler3
_o___stdio_common_vswprintf
_o__crt_atexit
_o__configure_wide_argv
_o__configthreadlocale
_o__errno
_o__cexit
memcmp
_o___p__commode
memcpy
wcsncmp
memset
EtwTraceMessage
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlNtStatusToDosError
RtlEqualSid
RtlIsMultiSessionSku
RtlQueryPackageClaims
RtlQueryPackageIdentity
EtwEventRegister
EtwEventUnregister
EtwEventWriteTransfer
EtwEventSetInformation
GetKernelObjectSecurity
PrivilegeCheck
AccessCheckByType
GetTokenInformation
GetLengthSid
CreateWellKnownSid
CopySid
MapGenericMask
AccessCheck
CoTaskMemAlloc
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
CoCreateFreeThreadedMarshaler
CoFreeUnusedLibrariesEx
CoTaskMemFree
CoImpersonateClient
CoRegisterClassObject
CoGetCallContext
CoRevokeClassObject
CoResumeClassObjects
CoInitializeEx
CoDecrementMTAUsage
CoRevertToSelf
CoInitializeSecurity
CoIncrementMTAUsage
GetModuleFileNameA
GetProcAddress
GetModuleHandleExW
GetModuleHandleW
PowerSettingUnregisterNotification
PowerSettingRegisterNotification
InitOnceExecuteOnce
InitOnceBeginInitialize
InitOnceComplete
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ReleaseMutex
CreateEventW
InitializeCriticalSectionEx
AcquireSRWLockShared
LeaveCriticalSection
CreateMutexExW
SetEvent
OpenSemaphoreW
ReleaseSRWLockShared
AcquireSRWLockExclusive
DeleteCriticalSection
WaitForSingleObjectEx
WaitForSingleObject
ReleaseSemaphore
CreateSemaphoreExW
EnterCriticalSection
ReleaseSRWLockExclusive
RoGetErrorReportingFlags
RoOriginateError
RoOriginateErrorW
RoSetErrorReportingFlags
GetProcessHeap
HeapAlloc
HeapSetInformation
HeapFree
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetLastError
SetErrorMode
WindowsDeleteString
WindowsCreateStringReference
WindowsCreateString
WindowsGetStringRawBuffer
OpenThreadToken
GetStartupInfoW
TerminateProcess
SetThreadStackGuarantee
GetCurrentProcessId
SetProcessShutdownParameters
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
UuidEqual
WaitForMultipleObjects
EventWriteTransfer
EventUnregister
EventRegister
EventSetInformation
SetProcessMitigationPolicy
IsProcessorFeaturePresent
GetProcessMitigationPolicy
RoGetActivationFactory
RoActivateInstance
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolTimer
SetThreadpoolTimer
FormatMessageW
OutputDebugStringW
IsDebuggerPresent
DebugBreak
CloseHandle
LocalFree
QueryFullProcessImageNameW
QueryPerformanceCounter
GetSystemInfo
GetSystemTimeAsFileTime
InitializeSListHead
ord69
ord99
ord153
LsaLookupFreeMemory
LsaLookupClose
LsaLookupOpenLocalPolicy
LsaLookupGetDomainInfo
GetApplicationUserModelIdFromToken
ApiSetQueryApiSetPresence
HamCloseActivity
VirtualAlloc
VirtualProtect
VirtualQuery
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
SetFilePointerEx
CreateFileW
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
CloseHandle
WriteConsoleW
GetConsoleMode
CreateThread
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LocalFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlUnwind
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreateVector
SafeArrayUnlock
SafeArrayLock
SafeArrayCreate
VariantInit
SysFreeString
SysAllocString
VariantClear
CLRCreateInstance
ord43
ord40
ord45
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleFileNameExA
GetProcessImageFileNameA
GetMappedFileNameA
EnumProcessModulesEx
QueryWorkingSet
NtCreateFile
ZwQueryInformationFile
NtQuerySystemInformation
RtlInitUnicodeString
RtlLookupFunctionEntry
RtlUnwindEx
RtlPcToFileHeader
RtlVirtualUnwind
RtlCaptureContext
PathCanonicalizeA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetConsoleScreenBufferInfo
GetStdHandle
SetConsoleTextAttribute
FlushConsoleInputBuffer
GetProcAddress
GetModuleHandleA
CloseHandle
OpenProcess
GetCurrentProcess
TerminateProcess
Process32Next
Process32First
GetLastError
CreateToolhelp32Snapshot
GetTickCount
GetCurrentProcessId
GetCurrentThread
GetProcessTimes
IsBadWritePtr
IsBadReadPtr
SetLastError
LoadLibraryA
FreeLibrary
CreateFileA
ExpandEnvironmentStringsA
QueryDosDeviceA
GetLogicalDrives
IsValidLocale
GetLongPathNameA
TerminateThread
GetProcessId
WaitForSingleObject
CreateThread
GetFileAttributesA
GetWindowsDirectoryA
GetFullPathNameA
CreateDirectoryA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualQueryEx
GetThreadContext
GetExitCodeThread
OpenThread
Thread32Next
Thread32First
UnmapViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
WriteFile
ReadFile
VirtualAlloc
VirtualFree
ReadProcessMemory
VirtualProtectEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryW
WriteConsoleW
SetEnvironmentVariableA
SetStdHandle
CreateFileW
SetEndOfFile
GetProcessHeap
GetCurrentDirectoryA
GetModuleFileNameA
GetTimeZoneInformation
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
Sleep
EncodePointer
DecodePointer
GetLocaleInfoW
HeapFree
RaiseException
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
GetCommandLineA
GetCPInfo
HeapAlloc
LCMapStringW
CompareStringW
HeapSetInformation
GetVersion
HeapCreate
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
FlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleHandleW
OpenThreadToken
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
ImpersonateSelf
LookupPrivilegeValueA
AdjustTokenPrivileges
SymInitialize
SymCleanup
StackWalk64
SymGetModuleBase64
SymFunctionTableAccess64
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ