Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
26df1e4a5d6cc1c5b072363510ffb26356f2d16e5bd2e59f794033860ff0e19a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
26df1e4a5d6cc1c5b072363510ffb26356f2d16e5bd2e59f794033860ff0e19a.exe
Resource
win10v2004-20230703-en
Target
11086c12fa66d4d537cb9a9549631c16.bin
Size
208KB
MD5
7803ad7fa8f30d259749a971d71ab915
SHA1
a949ba7e706331f9181dfd3a5f2eb11343f370c6
SHA256
85a93dce29173bae7be850f23a440bfa155757c651c6a664e1e4e508df4258c2
SHA512
5fecdcc58bc6c8fd892016dc3a8bffe7c4c98f6aae21a7e4f82a2950af767a2420ced18e5ef2a5d7607c96a66b542fce3b003ccfba2f9c32d33256e023ded627
SSDEEP
6144:fyL2ETVSqJBZWc/veaDIiQWuUWY1vUbahU:G2ySqcc/vHMiQmEEU
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
ord224
CertFreeCertificateContext
CertGetNameStringW
FindResourceExW
CreateFileW
CloseHandle
FindClose
DeleteFileW
FindNextFileW
GetFileAttributesW
CreateDirectoryW
WriteFile
SetFilePointer
GetModuleHandleW
GetWindowsDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
GetCurrentProcess
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
HeapFree
OpenProcess
Process32NextW
GetProcessTimes
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
LoadResource
ReadProcessMemory
Sleep
SetLastError
ExitProcess
lstrcmpiW
GetModuleFileNameW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
InitializeCriticalSectionEx
DecodePointer
GetCommandLineW
GetSystemTimeAsFileTime
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapReAlloc
QueryPerformanceCounter
HeapSize
HeapDestroy
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
LocalAlloc
GetLastError
LocalFree
FindResourceW
SizeofResource
LockResource
GetProcessHeap
TerminateProcess
HeapAlloc
InitializeSListHead
RtlUnwind
Process32FirstW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileType
GetStdHandle
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
RaiseException
FormatMessageA
GetLocaleInfoEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
EnumWindows
SetWindowPos
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongW
AllowSetForegroundWindow
SetEntriesInAclW
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
ShellExecuteExW
ShellExecuteW
CoCreateInstance
CoInitialize
CoAllowSetForegroundWindow
CoUninitialize
VariantInit
SysAllocString
SysFreeString
VariantClear
ord176
PathFileExistsW
PathIsUNCW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ