Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BScope.Rootkit.Agent.23387.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BScope.Rootkit.Agent.23387.exe
Resource
win10v2004-20230915-en
Target
SecuriteInfo.com.BScope.Rootkit.Agent.23387.30798
Size
138KB
MD5
a423847a422396c313332a22c7b333b8
SHA1
118e529f69fb938d503d2153ec6f34f34db67d51
SHA256
953c10a70284a0a7ad35f5ba4e70d7fa5b1fe755982e11feea85a69b8954d536
SHA512
eb98e25b9c3e72c3ac769a7c10af336317419d0c04547f46be0cf09098f4090ae6680c3d0fa1a5cc1fc629e81e5340b6ce7b1d51862fd10d051f24f26d3db874
SSDEEP
3072:KagkPLPr5tc4p5A3SaALpvY4pvYIa1sOBR4OTGMK7:KaHRtd5fu1sOnk7
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateEnvironmentBlock
htonl
htons
CreateProcessW
GetModuleHandleW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
InitializeCriticalSection
GetFileAttributesExW
InterlockedExchangeAdd
DeleteFileW
MoveFileW
lstrlenW
GetLastError
CreateFileW
SetFilePointer
InterlockedIncrement
InterlockedDecrement
FreeLibrary
WriteFile
DeleteCriticalSection
InterlockedExchange
EnterCriticalSection
LeaveCriticalSection
SetErrorMode
CreateEventW
OutputDebugStringW
GetExitCodeProcess
WaitForSingleObject
Sleep
SetEvent
SetLastError
OpenEventW
InterlockedCompareExchange
CreateSemaphoreA
FindResourceW
ReleaseSemaphore
GetFullPathNameW
PulseEvent
GetCurrentThreadId
HeapFree
SearchPathW
WaitForMultipleObjects
TerminateProcess
SetUnhandledExceptionFilter
VirtualAllocEx
OpenProcess
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetModuleHandleExW
MapViewOfFile
UnmapViewOfFile
ExpandEnvironmentStringsW
SwitchToThread
OpenFileMappingW
GetFileSize
GetSystemInfo
GetSystemDefaultLangID
VirtualQuery
LoadLibraryA
WideCharToMultiByte
GetLocaleInfoA
GetACP
GetVersionExA
HeapSize
HeapReAlloc
HeapDestroy
GetLocalTime
CloseHandle
GetCurrentProcess
FindResourceExW
GetProcAddress
LoadResource
LockResource
LoadLibraryW
SizeofResource
GetModuleFileNameW
GetTickCount
GetThreadLocale
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
lstrcmpiW
IsWindow
FindWindowA
UnregisterClassA
SendMessageTimeoutW
RegQueryInfoKeyW
RegSetKeySecurity
RegCreateKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegFlushKey
RegDeleteValueW
RegDeleteKeyW
CreateProcessAsUserW
DuplicateTokenEx
GetTokenInformation
RegQueryValueExW
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegGetKeySecurity
RegSetValueExW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
CLSIDFromString
CoCreateInstance
CoInitialize
CoUninitialize
VariantCopy
SysAllocString
VariantClear
VariantInit
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
?clear@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
?str@?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@G@Z
?setw@std@@YA?AU?$_Smanip@H@1@H@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
EnumProcesses
GetProcessMemoryInfo
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__CxxFrameHandler3
_invoke_watson
_controlfp_s
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_CxxThrowException
memcpy
_except_handler3
_unlock
memset
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
wcsrchr
_wcslwr_s
_vscwprintf
_invalid_parameter_noinfo
vswprintf_s
??_V@YAXPAX@Z
memmove_s
??0exception@std@@QAE@XZ
swscanf_s
memcpy_s
_wtoi64
??2@YAPAXI@Z
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
swprintf_s
_vscprintf
vsprintf_s
_wcsicmp
free
_recalloc
calloc
_purecall
malloc
wcscpy_s
_snwprintf
fflush
_snprintf_s
fwrite
_vsnprintf_s
strrchr
_memicmp
wcsncat_s
wcsncpy_s
_vsnwprintf_s
strchr
fclose
strncpy_s
_wsplitpath_s
__set_app_type
??4_Init_locks@std@@QAEAAV01@ABV01@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ