Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
xxx.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
xxx.dll
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
xxx.dll
Resource
win10v2004-20230703-en
Target
xxx.cpl
Size
280KB
MD5
00c05d72920d62077b7c670919214339
SHA1
f141c2a4b670b7f17adac33e2bada5682f7bc391
SHA256
092c344330bd5cba71377dead11946f7277f2dd4af57f5b636b70b343bc7ebe0
SHA512
edf0427482ba3966b8ec9062e2ee6e5ee57cb0e8552a78c3adfa1741857abea8a3a145bf73ae697fe9b2e7adfc5e8ee2180e313079a3d797555be5e2b8fd0b35
SSDEEP
3072:IN8M9PbPVnCxL1eFRCSHIAQE1j1R2Zkq9zvnwdE3ewIexZJHeAARBygstXKxeZVW:INPPbNnALqRC/27AxLwue2ZMr3ynYR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
memcpy
wcschr
_wcsicmp
wcsstr
memset
NtFreeVirtualMemory
NtAllocateVirtualMemory
NtResumeThread
NtProtectVirtualMemory
NtWriteVirtualMemory
LdrEnumerateLoadedModules
PathFileExistsW
TerminateThread
ExitProcess
CreateFileA
MapViewOfFile
FreeLibrary
GetCurrentProcess
ExpandEnvironmentStringsA
K32GetModuleInformation
GetModuleFileNameW
CreateFileMappingA
GetModuleHandleA
VirtualProtect
CloseHandle
GetThreadContext
SetThreadContext
CreateProcessW
HeapAlloc
UpdateProcThreadAttribute
HeapFree
GetProcessHeap
TerminateProcess
Process32FirstW
Process32NextW
InitializeProcThreadAttributeList
ExpandEnvironmentStringsW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
1
CPlApplet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ