Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BV.Obfuscated-O.5868.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BV.Obfuscated-O.5868.exe
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.BV.Obfuscated-O.5868.25555
Size
921KB
MD5
8d734fe7b0a01e5ff7028c296a172fe3
SHA1
672b56da9570b1181cabd39ea566a80b115a1795
SHA256
216f1c0ba684a52b81799798c2e7afdc9e41338961588753946e44ac45f1d20f
SHA512
3d9846619c1ba61c2b3aefd38123f8c617ac3337051af2a0bc276cde17b4147ad9f8d53297d8fd8ad19128291b4cf7ccd87be6201c9450724935c0f40bb6cbdd
SSDEEP
24576:iyyzQyz5io+HExGWUAyiqZhYIBqnGIQ5M6DLrVVdWHA8:irz5io+HGGWxyzhYqlrXVVdWHA8
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetLastError
WriteFile
SetFilePointer
FindClose
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetTempPathW
GetTempFileNameW
MoveFileW
GetProcAddress
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
ReadProcessMemory
FreeLibrary
SizeofResource
LockResource
FindResourceExW
FindResourceW
GetWindowsDirectoryW
GetModuleHandleW
Sleep
LocalFree
LocalAlloc
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetCommandLineW
GetStdHandle
GetModuleHandleExW
WriteConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
CreateFileW
CloseHandle
FindNextFileW
DeleteFileW
OutputDebugStringW
FormatMessageW
GetModuleFileNameW
LoadResource
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
GetFileType
BringWindowToTop
EnumWindows
GetWindowThreadProcessId
GetWindowLongW
GetForegroundWindow
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
ShellExecuteExW
ShellExecuteW
CoCreateInstance
CoUninitialize
CoInitialize
VariantInit
VariantClear
SysAllocString
SysFreeString
ord176
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ