Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230915-en
Target
setup.exe
Size
123KB
MD5
17e429d6981d165915f70bbb2d659b4b
SHA1
19f3c59338a4b5ad8e5ea7b96fec982592172839
SHA256
2aa81bc888dfa304e89dc43eca16d76bccaf2f2085c2565b1cf0c368493276e9
SHA512
2bc21f936ae8453f47307e29194ac2297b09b17816666b1d8e85cdb5d8eba6e4f610a92143a189a56fc141a001db9872dba656b4a91046829641b8b32854c755
SSDEEP
3072:l/R17fiqJKwF881ogN7ZWlyv515lYksbMk0GR0Z9Gl/:lp17fIwK2Tv51sA2/
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateFileA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
DeleteFileA
FindClose
SetFileAttributesA
FindFirstFileA
WideCharToMultiByte
Sleep
WaitForSingleObject
CreateThread
GetProcAddress
LoadLibraryW
FreeLibrary
OpenProcess
lstrcpyW
SetLastError
HeapFree
HeapAlloc
MultiByteToWideChar
TerminateProcess
FreeResource
SizeofResource
LoadResource
FindResourceA
WriteFile
LockResource
lstrcpyA
GetModuleFileNameA
LoadLibraryA
GetTempPathA
GetCurrentDirectoryA
GetSystemDirectoryA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetTickCount
CreateDirectoryA
GetTempFileNameA
RemoveDirectoryA
FindNextFileA
GetCurrentProcess
GetVersionExA
GetModuleHandleA
CloseHandle
GetDateFormatA
GetLocalTime
lstrcpynA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
VirtualQuery
InterlockedExchange
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
FlushFileBuffers
GetACP
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetStdHandle
GetStdHandle
SetHandleCount
SetEndOfFile
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileTime
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetFileAttributesA
RaiseException
RtlUnwind
ExitProcess
SetFilePointer
ReadFile
GetFileType
GetLastError
ShowWindow
SendMessageA
PostMessageA
GetWindowThreadProcessId
wvsprintfA
FindWindowA
GetActiveWindow
IsWindow
IsWindowVisible
InvalidateRect
UpdateWindow
GetForegroundWindow
AttachThreadInput
SetForegroundWindow
BringWindowToTop
IsIconic
MonitorFromWindow
GetMonitorInfoA
PeekMessageA
GetWindowRect
SetWindowPos
GetWindowLongA
SetWindowLongA
GetMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
UnregisterClassA
PostQuitMessage
DestroyWindow
SetWindowTextA
GetWindowTextA
wsprintfA
GetDlgItem
DefDlgProcA
LoadCursorA
RegisterClassA
EnumWindows
CreateDialogParamA
CreateSolidBrush
ShellExecuteExA
InitCommonControlsEx
PathFindFileNameA
PathIsDirectoryA
PathCombineA
PathRemoveFileSpecA
PathAppendA
PathStripPathA
PathRemoveBackslashA
PathRenameExtensionA
PathStripPathW
PathAddBackslashA
PathFileExistsA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ