Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a1fdf4f4aee1ad8830f255c0b21ac889_floxif_magniber_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a1fdf4f4aee1ad8830f255c0b21ac889_floxif_magniber_JC.exe
Resource
win10v2004-20230703-en
Target
a1fdf4f4aee1ad8830f255c0b21ac889_floxif_magniber_JC.exe
Size
5.4MB
MD5
a1fdf4f4aee1ad8830f255c0b21ac889
SHA1
d0742cb05e1bb47c8973f506148009d1fa54919c
SHA256
20f4ab5eac4f2db17b9e8999db43c4932ccba4ff420a68b7683e51a4a600353a
SHA512
50ebeb03ad52a7ebf920b56f04a0aa9b545c68e5a20acb24c0307c4b13aea1d645ee0e370a26fed8f445d293d5ea14a64080ed23593875ca34530eae3c1dd767
SSDEEP
98304:b1M40SIsdGf/WwbsduJ7S6ayfgCleUx73lnHT3lGt0pjgEHNOlYRGU3pwY2hmM9:pM33TlUuJ7S6ayfgCleUBFBGtIIOGoW9
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Rectangle
SetDCBrushColor
CreatePen
GetTextMetricsW
SelectObject
CreateFontW
SetDCPenColor
GetTextExtentPoint32W
CreateSolidBrush
SetTextColor
SetBkColor
GetStockObject
DeleteObject
GetDeviceCaps
VariantInit
VariantClear
SysFreeString
SysAllocString
CryptHashData
RegEnumValueA
SetServiceObjectSecurity
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
DeleteService
EnumDependentServicesW
ControlService
StartServiceW
QueryServiceConfigW
QueryServiceStatusEx
OpenServiceW
CloseServiceHandle
RegSetKeySecurity
OpenSCManagerW
AdjustTokenPrivileges
EventWrite
RegCreateKeyExW
RegCloseKey
EventWriteTransfer
EventRegister
EventUnregister
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegSetValueExW
RegDeleteValueW
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
CryptReleaseContext
CryptAcquireContextW
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
RegDeleteValueA
RegNotifyChangeKeyValue
RevertToSelf
OpenThreadToken
OpenProcessToken
GetLengthSid
CopySid
InitializeAcl
AddAccessAllowedAce
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
CreateWellKnownSid
EqualSid
ImpersonateLoggedOnUser
LookupPrivilegeValueW
GetConsoleCP
GetCurrentProcess
InitializeCriticalSectionEx
GetLastError
CompareStringEx
DeleteCriticalSection
FlsFree
FlsAlloc
IsWow64Process
CloseHandle
CreateThread
GetExitCodeThread
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
FindClose
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LoadLibraryA
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
GetSystemTimeAsFileTime
TlsAlloc
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetTickCount64
GetModuleHandleExW
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
LoadLibraryExW
FindResourceW
SizeofResource
LoadResource
VerSetConditionMask
VerifyVersionInfoW
OpenProcess
GetCurrentProcessId
GetStringTypeW
GetVersionExW
GetUserDefaultLocaleName
IsValidCodePage
SetLastError
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
GetCPInfoExW
GetDiskFreeSpaceExW
CreateFileW
DeviceIoControl
SetErrorMode
GetComputerNameW
MulDiv
FormatMessageW
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemDirectoryW
HeapFree
OutputDebugStringA
GetModuleHandleA
LoadLibraryW
HeapAlloc
GetProcessHeap
CreateEventW
SetEvent
WaitForSingleObject
WaitForMultipleObjectsEx
CreateEventExW
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
HeapSize
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
ReleaseSemaphore
WaitForSingleObjectEx
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
RtlCaptureStackBackTrace
ReleaseMutex
TzSpecificLocalTimeToSystemTime
GetTempPathW
GetLongPathNameW
ResetEvent
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualProtectEx
GetSystemInfo
GlobalFree
GlobalAlloc
ReadFile
WriteFile
GetFileSizeEx
LockResource
SetEndOfFile
SetFilePointerEx
GetOverlappedResult
FlushFileBuffers
CancelIoEx
GetFileAttributesExW
DeleteFileW
CreateDirectoryW
SetFileAttributesW
RemoveDirectoryW
GetDriveTypeW
FindFirstFileExW
FindNextFileW
GetFileType
CopyFileW
MoveFileExW
GetTempFileNameW
SetFileInformationByHandle
GetFileInformationByHandleEx
SignalObjectAndWait
GetProcessAffinityMask
GetLogicalProcessorInformationEx
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
GetTickCount
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
IsProcessorFeaturePresent
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetCurrentThread
GetQueuedCompletionStatus
IsDebuggerPresent
WaitForMultipleObjects
GetStartupInfoW
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
CreateMutexW
VirtualFree
ExpandEnvironmentStringsW
VirtualAlloc
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
LocalAlloc
GetThreadLocale
FindFirstFileW
lstrcmpW
GetFullPathNameW
ProcessIdToSessionId
GetCommandLineW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetPriorityClass
GetExitCodeProcess
GetProcessId
K32EnumProcesses
GetTimeZoneInformation
IsValidLocale
GetLocaleInfoEx
LCIDToLocaleName
LocaleNameToLCID
GetLocaleInfoW
ResolveLocaleName
GetUserPreferredUILanguages
GetACP
LCMapStringEx
GetSystemDefaultLCID
EnumSystemLocalesEx
GetSystemDefaultLocaleName
GetUserGeoID
GetPhysicallyInstalledSystemMemory
GetProductInfo
SwitchToThread
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
AreFileApisANSI
GetFileInformationByHandle
EncodePointer
DuplicateHandle
OpenThread
K32GetProcessImageFileNameW
GetSystemPreferredUILanguages
GetDateFormatW
GetTimeFormatW
DeleteTimerQueueTimer
CreateTimerQueueTimer
FreeConsole
WriteConsoleW
GetStdHandle
AllocConsole
AttachConsole
DecodePointer
ExitThread
ExitProcess
HeapReAlloc
EnumSystemLocalesW
SetStdHandle
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
VirtualQuery
LoadLibraryExA
ReadConsoleW
WaitForThreadpoolWaitCallbacks
GetLocalTime
IIDFromString
CoTaskMemAlloc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
CoRegisterInitializeSpy
CoRevokeInitializeSpy
CoCancelCall
CLSIDFromString
CoEnableCallCancellation
CoDisableCallCancellation
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
SetupIterateCabinetW
FreeAddrInfoW
WSACleanup
WSAStartup
GetAddrInfoW
GdipDeleteGraphics
GdipFillRectangleI
GdipDrawImageRectRectI
GdiplusStartup
GdipDrawImageRectI
GdipFree
GdipCloneBrush
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipLoadImageFromStream
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipCreateSolidFill
GdipDeleteBrush
GdipCreateFromHDC
RpcStringFreeW
UuidToStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ