Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8a68ceb4834c955c172b49ba6abecdfc111086f3a7572ff9d6904b178efdb582.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8a68ceb4834c955c172b49ba6abecdfc111086f3a7572ff9d6904b178efdb582.exe
Resource
win10v2004-20230703-en
Target
8a68ceb4834c955c172b49ba6abecdfc111086f3a7572ff9d6904b178efdb582
Size
2.3MB
MD5
ce3379109684593d4acdeb5fb343112a
SHA1
911ba3f5d3fb232d9594accfc9cba53997f8bf66
SHA256
8a68ceb4834c955c172b49ba6abecdfc111086f3a7572ff9d6904b178efdb582
SHA512
750ced7fca9f9d6aad8790459d9abdb6a6d839adfb51cd1b394ee429694b713e2d14e635477f298de0707234b4172d5fc7171f54182e5d632b4a2619f4862783
SSDEEP
49152:lexg9fIzi67fIYralaTRiqFJ8WYOlrcNcsxq6ERTjqTvDEF1Y1c7gfIKcEKOEW:lj9fIzo+iqFvYOJcNcMC/SvDAqqE0EK4
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetSystemTimeAsFileTime
GetEnvironmentStringsW
CompareStringEx
GetLocaleInfoEx
LCMapStringEx
GetComputerNameW
GetProcAddress
GetTimeZoneInformation
GetLocalTime
FileTimeToSystemTime
WritePrivateProfileStringW
GetCurrentProcessId
CreateThread
WaitForSingleObject
CreateMutexW
TerminateProcess
lstrcmpiW
lstrcmpiA
CopyFileW
DeleteFileW
Sleep
FindClose
RemoveDirectoryW
FindNextFileW
FindFirstFileW
lstrcpyW
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
LoadLibraryW
DecodePointer
WriteConsoleW
GetConsoleOutputCP
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetTimeFormatW
GetDateFormatW
QueryPerformanceFrequency
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlUnwind
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
GetConsoleMode
TerminateThread
GetTickCount64
GetPrivateProfileStringW
CreateEventW
OutputDebugStringA
GetSystemTime
SystemTimeToFileTime
MoveFileExW
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
GetLastError
GetCommandLineA
HeapSize
lstrlenA
InitializeCriticalSectionEx
lstrlenW
GetCommandLineW
HeapFree
SetFilePointer
SetEndOfFile
GetFileType
FlushFileBuffers
MoveFileW
DeviceIoControl
SetFileTime
SetFileAttributesW
GetFileAttributesW
GetProcessAffinityMask
CreateSemaphoreW
ReleaseSemaphore
InitializeCriticalSection
GetVersionExW
SetThreadExecutionState
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
GetTempPathW
LocalFree
FileTimeToLocalFileTime
ReadFile
WriteFile
FindResourceW
LoadResource
SizeofResource
LockResource
GlobalSize
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
CreateFileW
GetCurrentThreadId
GetFileSizeEx
SetFilePointerEx
GetWindowsDirectoryA
lstrcpyA
GetNativeSystemInfo
GetStartupInfoW
CreateProcessW
GetStdHandle
GetFileSize
GetTickCount
OpenProcess
CreateDirectoryW
K32GetModuleFileNameExW
QueryFullProcessImageNameW
lstrcmpW
GetSystemDirectoryW
lstrcatW
SetLastError
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetProcessTimes
SetEvent
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
AreFileApisANSI
CompareStringW
GetCPInfo
IsDBCSLeadByte
LocalFileTimeToFileTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
SetThreadPriority
GetSystemMetrics
SetWindowTextW
RegisterClassExW
LoadAcceleratorsW
GetWindowThreadProcessId
OpenClipboard
EnumClipboardFormats
GetClipboardData
EmptyClipboard
SetClipboardData
CloseClipboard
GetClassNameW
EnumChildWindows
EnumWindows
GetClassLongW
keybd_event
GetKeyState
mouse_event
IsIconic
SetLayeredWindowAttributes
SendMessageW
OemToCharA
OemToCharBuffA
CharUpperW
CharLowerW
CharToOemBuffW
LoadStringW
ShowWindow
IsWindow
DispatchMessageW
SetTimer
IsDialogMessageW
CreateWindowExW
SendDlgItemMessageW
MoveWindow
SetFocus
TranslateAcceleratorW
TranslateMessage
LoadIconW
LoadCursorW
SetWindowLongW
GetClientRect
GetDlgItem
PostQuitMessage
GetDesktopWindow
MessageBoxW
SetWindowPos
GetDC
DestroyWindow
GetWindowRect
DefWindowProcW
CreateDialogParamW
GetMessageW
GetWindowTextW
EndPaint
BeginPaint
ReleaseDC
GetWindowLongW
FindWindowW
IsWindowVisible
PostMessageW
SetForegroundWindow
wsprintfW
SetCapture
CharToOemA
UpdateWindow
LoadImageW
InvalidateRect
ChildWindowFromPoint
SetDlgItemTextW
SelectObject
GetDeviceCaps
SetTextColor
SetBkMode
LineTo
CreatePen
MoveToEx
DeleteObject
CreateSolidBrush
CreateFontIndirectW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegGetValueW
LookupAccountNameW
ConvertSidToStringSidA
RegCreateKeyExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
SetFileSecurityW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
SHCreateDirectoryExW
CoCreateGuid
CoUninitialize
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
SysFreeString
VariantClear
VariantInit
SysAllocString
PathFileExistsA
PathAppendA
StrStrA
PathAppendW
PathIsDirectoryW
PathFindExtensionW
PathFindFileNameW
StrStrW
SHGetValueW
StrStrIW
SHSetValueW
StrStrIA
PathFileExistsW
GetAdaptersAddresses
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
WinHttpSetOption
WinHttpConnect
WinHttpOpenRequest
WinHttpQueryOption
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpWriteData
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpReadData
WinHttpCrackUrl
WinHttpOpen
WinHttpQueryDataAvailable
inet_ntop
_cJSON_AddArrayToObject@8
_cJSON_AddBoolToObject@12
_cJSON_AddFalseToObject@8
_cJSON_AddItemReferenceToArray@8
_cJSON_AddItemReferenceToObject@12
_cJSON_AddItemToArray@8
_cJSON_AddItemToObject@12
_cJSON_AddItemToObjectCS@12
_cJSON_AddNullToObject@8
_cJSON_AddNumberToObject@16
_cJSON_AddObjectToObject@8
_cJSON_AddRawToObject@12
_cJSON_AddStringToObject@12
_cJSON_AddTrueToObject@8
_cJSON_Compare@12
_cJSON_CreateArray@0
_cJSON_CreateArrayReference@4
_cJSON_CreateBool@4
_cJSON_CreateDoubleArray@8
_cJSON_CreateFalse@0
_cJSON_CreateFloatArray@8
_cJSON_CreateIntArray@8
_cJSON_CreateNull@0
_cJSON_CreateNumber@8
_cJSON_CreateObject@0
_cJSON_CreateObjectReference@4
_cJSON_CreateRaw@4
_cJSON_CreateString@4
_cJSON_CreateStringArray@8
_cJSON_CreateStringReference@4
_cJSON_CreateTrue@0
_cJSON_Delete@4
_cJSON_DeleteItemFromArray@8
_cJSON_DeleteItemFromObject@8
_cJSON_DeleteItemFromObjectCaseSensitive@8
_cJSON_DetachItemFromArray@8
_cJSON_DetachItemFromObject@8
_cJSON_DetachItemFromObjectCaseSensitive@8
_cJSON_DetachItemViaPointer@8
_cJSON_Duplicate@8
_cJSON_GetArrayItem@8
_cJSON_GetArraySize@4
_cJSON_GetErrorPtr@0
_cJSON_GetNumberValue@4
_cJSON_GetObjectItem@8
_cJSON_GetObjectItemCaseSensitive@8
_cJSON_GetStringValue@4
_cJSON_HasObjectItem@8
_cJSON_InitHooks@4
_cJSON_InsertItemInArray@12
_cJSON_IsArray@4
_cJSON_IsBool@4
_cJSON_IsFalse@4
_cJSON_IsInvalid@4
_cJSON_IsNull@4
_cJSON_IsNumber@4
_cJSON_IsObject@4
_cJSON_IsRaw@4
_cJSON_IsString@4
_cJSON_IsTrue@4
_cJSON_Minify@4
_cJSON_Parse@4
_cJSON_ParseWithLength@8
_cJSON_ParseWithLengthOpts@16
_cJSON_ParseWithOpts@12
_cJSON_Print@4
_cJSON_PrintBuffered@12
_cJSON_PrintPreallocated@16
_cJSON_PrintUnformatted@4
_cJSON_ReplaceItemInArray@12
_cJSON_ReplaceItemInObject@12
_cJSON_ReplaceItemInObjectCaseSensitive@12
_cJSON_ReplaceItemViaPointer@12
_cJSON_SetNumberHelper@12
_cJSON_SetValuestring@8
_cJSON_Version@0
_cJSON_free@4
_cJSON_malloc@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ