Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
540ecb2e26c1ed1ccbb2c21fa238cc16d94ed0b1bd7878d77c9e49762364d701.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
540ecb2e26c1ed1ccbb2c21fa238cc16d94ed0b1bd7878d77c9e49762364d701.exe
Resource
win10v2004-20230703-en
Target
540ecb2e26c1ed1ccbb2c21fa238cc16d94ed0b1bd7878d77c9e49762364d701
Size
3.6MB
MD5
7a08670cafcfa5d5eba4b5fad8edb4c0
SHA1
da780ab5da651bb7d48f1aa434f69c91d5c8b1a4
SHA256
540ecb2e26c1ed1ccbb2c21fa238cc16d94ed0b1bd7878d77c9e49762364d701
SHA512
93e9eb92af3e598fc9b99038a22571dd5e32d5740e764387dac0671dabb419ef143b6d3be4367bd5dd21d27b949a8e1f5af249391a81e51b94cb3b0b4979e143
SSDEEP
98304:98zkNbPhEOoLvv4KkhMft+AoPegfy1Ejb2+n:98zQbpEOo7Chut+l0Ejb2Q
metasploit
encoder/shikata_ga_nai
metasploit
windows/reverse_tcp
127.0.0.1:4444
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetDllDirectoryW
MoveFileW
CopyFileW
FreeLibrary
GetLastError
ExitProcess
GetCurrentProcessId
GetTickCount
SetThreadLocale
SetLastError
EnterCriticalSection
GetCurrentProcess
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
GetUserDefaultLCID
LoadLibraryW
DeleteCriticalSection
GetModuleHandleW
GetStdHandle
WriteConsoleA
WriteFile
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
ReadFile
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MoveFileExW
GetFileSize
MapViewOfFile
GetFileTime
VirtualProtect
GetTempPathW
Sleep
SetEvent
GetVersionExA
GetEnvironmentStringsW
CreateProcessW
WideCharToMultiByte
RaiseException
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
HeapReAlloc
IsValidLocale
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
SetEndOfFile
ReadConsoleW
GetEnvironmentVariableW
GetProcAddress
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
DeleteFileW
GetFileAttributesW
FindClose
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
GetFullPathNameW
GetCommandLineW
FindFirstFileW
MultiByteToWideChar
CreateDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ