Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BV.Obfuscated-O.9662.30931.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BV.Obfuscated-O.9662.30931.exe
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.BV.Obfuscated-O.9662.30931.exe
Size
920KB
MD5
e693639a941075005bfd6523f6ba0abc
SHA1
693d0d79e0edce0a0e507d5753ebde6b4c6c22da
SHA256
ef1f9cd3dcf5046fa45acfb0b027952a440ce6634c04b35b63e38d51bac65649
SHA512
95d4b1610db717f5a1b82efe0ef089f931ec7912f9242a8e005480d4199f0e59438bc45b8fc04a86639f54e3128c8096d5ba88955a19049a414af16050ee9120
SSDEEP
24576:iyyzQyz5io+HExGWUAyiqZhYjBqnGIQ5M6DLrVVdWHAjnM6d9:irz5io+HGGWxyzhYJlrXVVdWHAjnM6j
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetLastError
WriteFile
SetFilePointer
FindClose
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetTempPathW
GetTempFileNameW
MoveFileW
GetProcAddress
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
ReadProcessMemory
FreeLibrary
SizeofResource
LockResource
FindResourceExW
FindResourceW
GetWindowsDirectoryW
GetModuleHandleW
Sleep
LocalFree
LocalAlloc
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetCommandLineW
GetStdHandle
GetModuleHandleExW
WriteConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
CreateFileW
CloseHandle
FindNextFileW
DeleteFileW
OutputDebugStringW
FormatMessageW
GetModuleFileNameW
LoadResource
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
GetFileType
BringWindowToTop
EnumWindows
GetWindowThreadProcessId
GetWindowLongW
GetForegroundWindow
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
ShellExecuteExW
ShellExecuteW
CoCreateInstance
CoUninitialize
CoInitialize
VariantInit
VariantClear
SysAllocString
SysFreeString
ord176
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ