Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
sidchgl64-3.0i.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
sidchgl64-3.0i.exe
Resource
win10v2004-20230824-en
Target
sidchgl64-3.0i.exe
Size
1.5MB
MD5
1be1ae0cff4819463681201bed9ab76b
SHA1
39152e8bbeeb008bb01de4529dd97a080bad8a28
SHA256
c022887f0504c4b9519300ddd2e9d6795e15d42e0fc123a5517fdf4341f5f4cf
SHA512
2d82122b70fe996153483cfab004dc5bc4a4c52f273802c0695446dcc8bf7fa90d0e07cabebcde8912e95c68a0909af2187113cf41ff680021bbe645e4d3f318
SSDEEP
24576:xAQYPiBq7TiMOnP/sPD/iKoiMynJQlb2gORThQKsgfSJODwu+DurQmfuPze:xAQ+B+P/sPrOiAlbs6/JODwu+Dur8be
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetAdaptersAddresses
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
LsaFreeReturnBuffer
LsaGetLogonSessionData
LsaEnumerateLogonSessions
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
WinStationEnumerateW
WinStationFreeMemory
WinStationQueryInformationW
GetProcessHeap
WriteFile
GetUserDefaultLangID
OpenProcess
GlobalAlloc
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
GetConsoleMode
Sleep
GetConsoleWindow
GetVersionExW
WriteConsoleW
TerminateProcess
ReadFile
GetModuleFileNameW
GetTimeZoneInformation
CreateFileW
lstrcmpW
lstrlenW
SetThreadPriority
GlobalUnlock
GetTempPathW
GetLastError
SetLastError
GetProcAddress
GlobalFree
FindClose
Process32FirstW
AddVectoredExceptionHandler
SetConsoleCtrlHandler
GlobalHandle
Process32NextW
GetProcessShutdownParameters
lstrcatW
FindNextFileW
CreateToolhelp32Snapshot
GetCurrentThreadId
SetProcessShutdownParameters
CloseHandle
DeleteFileW
GetCurrentProcessId
LocalFree
WriteProcessMemory
lstrcpyW
SetFileAttributesW
LCMapStringW
RtlZeroMemory
CreateThread
GetFullPathNameW
GetFullPathNameA
HeapReAlloc
CreateFileA
CreateMutexW
HeapCompact
SetFilePointer
TryEnterCriticalSection
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
FreeLibrary
SystemTimeToFileTime
QueryPerformanceCounter
UnlockFile
FlushViewOfFile
LockFile
WaitForSingleObjectEx
OutputDebugStringW
UnlockFileEx
GetSystemTimeAsFileTime
FormatMessageA
InitializeCriticalSection
FormatMessageW
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
HeapValidate
GetFileAttributesW
MultiByteToWideChar
FlushFileBuffers
HeapSize
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
DeleteCriticalSection
OutputDebugStringA
GetVersionExA
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
ReadConsoleW
SetFilePointerEx
CompareStringW
GetCurrentThread
CreateNamedPipeW
GetTickCount
GetModuleHandleW
ConnectNamedPipe
SleepEx
SetThreadExecutionState
SetEvent
WaitForSingleObject
GlobalLock
HeapFree
GetCurrentProcess
SetUnhandledExceptionFilter
HeapAlloc
CreateProcessW
SetErrorMode
GetDriveTypeW
FindFirstFileW
SetPriorityClass
GetFileSize
GetTempFileNameW
ExitProcess
SetStdHandle
SetEnvironmentVariableW
GetConsoleCP
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
GetCommandLineW
GetFileType
GetStdHandle
GetModuleHandleExW
IsProcessorFeaturePresent
IsDebuggerPresent
LoadLibraryExW
SetEnvironmentVariableA
ExitThread
DecodePointer
EncodePointer
ExitWindowsEx
GetShellWindow
GetWindowThreadProcessId
wsprintfW
ShowWindow
GetSystemMetrics
LineTo
MoveToEx
EndPage
GetTextMetricsW
TextOutW
StartPage
SelectObject
SetMapMode
GetTextExtentPointW
InitializeSecurityDescriptor
CloseServiceHandle
GetSecurityDescriptorDacl
RegSetValueExW
EnumServicesStatusExW
RegCloseKey
RegLoadKeyW
InitiateSystemShutdownW
EncryptFileW
ConvertSidToStringSidW
RegFlushKey
AbortSystemShutdownW
ControlService
RegisterServiceCtrlHandlerW
FreeSid
OpenProcessToken
CryptAcquireContextW
DeleteService
OpenThreadToken
OpenSCManagerW
StartServiceCtrlDispatcherW
EnumDependentServicesW
GetUserNameW
RevertToSelf
SetEntriesInAclW
QueryServiceStatusEx
SetServiceStatus
AllocateAndInitializeSid
RegDeleteValueW
CredWriteW
DuplicateTokenEx
StartServiceW
LookupAccountSidW
ImpersonateSelf
SetSecurityDescriptorDacl
ConvertStringSidToSidW
SetTokenInformation
OpenServiceW
CreateProcessAsUserW
RegQueryValueExW
CryptReleaseContext
EqualSid
GetTokenInformation
CredReadW
CreateServiceW
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
NtRenameKey
NtShutdownSystem
memchr
NtLoadKey
NtSetThreadExecutionState
NtSetInformationFile
RtlGetVersion
NtCreateKey
RtlUnicodeToMultiByteN
RtlGetSaclSecurityDescriptor
NtQueryInformationFile
vswprintf_s
MD5Update
NtQueryInformationProcess
RtlTimeFieldsToTime
_wcslwr
RtlSetGroupSecurityDescriptor
NtQueryDirectoryFile
RtlGetGroupSecurityDescriptor
NtWaitForSingleObject
RtlSetSaclSecurityDescriptor
strncpy
NtQueryVolumeInformationFile
wcsstr
_wcsicmp
RtlGetControlSecurityDescriptor
NtCreateFile
RtlNtStatusToDosError
NtClose
swprintf_s
NtOpenKeyEx
RtlQueryInformationAcl
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
MD5Init
RtlEqualSid
RtlTimeToTimeFields
swscanf_s
NtQueryPerformanceCounter
RtlGetDaclSecurityDescriptor
RtlLeaveCriticalSection
NtOpenProcessToken
NtCreateSemaphore
toupper
NtQueryInformationToken
NtSetSecurityObject
NtQueryValueKey
NtSetValueKey
wcsncmp
NtSetInformationKey
towupper
NtDeleteKey
NtQueryObject
RtlAllocateAndInitializeSid
RtlMultiByteToUnicodeN
RtlGetOwnerSecurityDescriptor
NtOpenFile
RtlInitializeCriticalSection
RtlCreateUserThread
NtReadFile
NtDuplicateObject
RtlCreateSecurityDescriptor
RtlSetOwnerSecurityDescriptor
strrchr
strcspn
RtlGetAce
wcschr
NtFlushKey
NtEnumerateValueKey
NtAllocateVirtualMemory
towlower
NtDeleteValueKey
NtFsControlFile
RtlInitUnicodeString
RtlSetDaclSecurityDescriptor
RtlFreeSid
NtReleaseSemaphore
_wcsnicmp
NtUnloadKey
NtQueryInformationThread
NtQuerySystemInformation
RtlSetLastWin32Error
NtWriteFile
NtDeviceIoControlFile
strncmp
RtlEnterCriticalSection
memmove
NtQuerySystemTime
NtQuerySecurityObject
NtEnumerateKey
sscanf
sprintf_s
NtFlushBuffersFile
NtGetTickCount
MD5Final
NtDelayExecution
NtQueryKey
RtlAdjustPrivilege
RtlGetLastWin32Error
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ