Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
handle.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
handle.exe
Resource
win10v2004-20230824-en
Target
handle.exe
Size
743KB
MD5
9f637fba2d680e23da0266c1507f870f
SHA1
05d4842c6e9b5f9430dad76a20c2a4a6feae0bf0
SHA256
84c22579ca09f4fd8a8d9f56a6348c4ad2a92d4722c9f1213dd73c2f68a381e3
SHA512
addf414497df3a057ba57afab06a61f0ffb7c50134b0c83b61fe6542ec25298b893a455b317262977786f30723a23948836b402d310d6ae4bee1e6cf17a0272c
SSDEEP
12288:Lsfe2MShO2bM1teJFN9rVY5C1lq7oFpuoIG6h:Lsfe2Y2bItIHY5C1lq0nus6h
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetDriveTypeW
GetFullPathNameW
DuplicateHandle
SetThreadErrorMode
DeviceIoControl
SetEvent
WaitForSingleObject
CreateEventW
GetCurrentProcessId
TerminateThread
CreateProcessW
OpenProcess
GetSystemDirectoryW
FormatMessageW
FindClose
GetConsoleScreenBufferInfo
GetVersionExW
LoadLibraryExW
WriteConsoleW
HeapSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
DeleteFileW
GetCurrentDirectoryW
ExpandEnvironmentStringsW
VerSetConditionMask
FindResourceW
LockResource
SizeofResource
GetCurrentProcess
LoadResource
SetLastError
GetLastError
CloseHandle
CreateFileW
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleW
GetCommandLineW
GetStdHandle
GetModuleFileNameW
VerifyVersionInfoW
GetFileType
HeapReAlloc
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
SetStdHandle
ExitProcess
GetModuleHandleExW
GetConsoleCP
CreateThread
ExitThread
FreeLibraryAndExitThread
WriteFile
GetCommandLineA
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
SetConsoleMode
ReadConsoleInputW
ReadConsoleW
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
SendMessageW
DialogBoxIndirectParamW
EndDialog
LoadCursorW
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextW
GetDlgItem
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
EndPage
PrintDlgW
LookupAccountSidW
GetTokenInformation
RegDeleteKeyW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ