Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
trojan_4982.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
trojan_4982.exe
Resource
win10v2004-20230915-en
Target
trojan_4982.zip
Size
140KB
MD5
f9b6b40037d0a41b9ab646843d80bd3d
SHA1
c8db06db59548c77b6ef6db23390aebc256d5af2
SHA256
7538f00a4b859689b38835f2c9816e7ac0c435875753f5d2378568a619b6d05c
SHA512
78603da822922a0346ae06230cf8c09b4d311f406564c5bcabbf6be519ac33d6cb698507fe2a7bd25f407688647bf9d02d7ea8516ec6084bee417b9541f3b3ff
SSDEEP
3072:i3FYhB/4ExGCyGPVPCd0PYUZCM5DC4zBhNSkjNRnbg2nnxBR:i3FYb/vZ7NeuRL9/hNSkpVtnxBR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
OutputDebugStringW
GetProcessHeap
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
HeapDestroy
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
RaiseException
GetLastError
HeapSize
EnterCriticalSection
LocalAlloc
LockResource
DecodePointer
DeleteCriticalSection
CloseHandle
DebugBreak
LocalFree
HeapFree
WriteFile
Sleep
ReadFile
CreateFileW
lstrcpyA
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
SetLastError
GetProcAddress
DeleteFileW
SetFileAttributesW
GetVersionExW
FlushFileBuffers
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
LoadLibraryExW
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
HeapAlloc
LoadResource
FindResourceW
FindResourceExW
lstrlenA
GetFileSize
HeapReAlloc
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCurrentThreadId
SetEnvironmentVariableA
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
CompareStringW
GetStartupInfoW
IsDebuggerPresent
EncodePointer
GetStringTypeW
GetSystemTimeAsFileTime
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
IsProcessorFeaturePresent
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CharNextW
MessageBoxW
LoadStringW
CharLowerW
LoadIconW
RegQueryValueExW
RegCloseKey
ConvertSidToStringSidW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
SHGetFolderPathW
CoUninitialize
CoInitialize
CoCreateInstance
StrToIntW
StrDupW
StrCatW
PathQuoteSpacesW
StrCpyW
PathFileExistsW
wnsprintfW
WSAResetEvent
WSASetLastError
WSAEnumNetworkEvents
WSACreateEvent
freeaddrinfo
WSAGetOverlappedResult
WSACleanup
WSAEventSelect
WSAConnect
WSAGetLastError
WSASend
WSASocketW
WSARecv
getaddrinfo
WSAStartup
WSASetEvent
WSACloseEvent
closesocket
UuidCreateSequential
UrlMkGetSessionOption
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ