Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
1036b5af66f6...0c.exe
windows7-x64
136b5af66f6...0c.exe
windows10-2004-x64
14e0e4660d2...0e.exe
windows7-x64
104e0e4660d2...0e.exe
windows10-2004-x64
104e1e797827...5a.exe
windows7-x64
104e1e797827...5a.exe
windows10-2004-x64
104f78fafd88...ce.dll
windows7-x64
14f78fafd88...ce.dll
windows10-2004-x64
153b125ce63...e3.exe
windows7-x64
1053b125ce63...e3.exe
windows10-2004-x64
10Behavioral task
behavioral1
Sample
36b5af66f601502999214171c0f4d217a65fcbbd7d2a6b93df13b8a39bd0250c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
36b5af66f601502999214171c0f4d217a65fcbbd7d2a6b93df13b8a39bd0250c.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
4e0e4660d283270ae7abac2520b0bbd19324ff879c079ddb771c072bc7bbf60e.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
4e0e4660d283270ae7abac2520b0bbd19324ff879c079ddb771c072bc7bbf60e.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
4e1e7978279a0ae65856db0180a0fde56b17572d1483f15bf56a6875ac0c045a.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
4e1e7978279a0ae65856db0180a0fde56b17572d1483f15bf56a6875ac0c045a.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
4f78fafd88db3a202cd19735892319e7de50ff4c8d949239316f8ea5270578ce.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
4f78fafd88db3a202cd19735892319e7de50ff4c8d949239316f8ea5270578ce.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
53b125ce63cb17baee9c49fd3d7ae834ecac6168313ef7a92e46639262d96be3.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
53b125ce63cb17baee9c49fd3d7ae834ecac6168313ef7a92e46639262d96be3.exe
Resource
win10v2004-20230915-en
Target
mkpub_part_b.zip
Size
644KB
MD5
575885786d079750919aafe0f47785a2
SHA1
35dba4d9781c705eea072caf1ca7844dd241ccc6
SHA256
0a775c196299f276df502a546abce3fef0359e80fd2fc84cdde6dc9c91870de0
SHA512
ef0292381dadcdee4659a282e5f0635aee1790f16b55d24fcc8335d316dbf6a23dabfcecd9125b16a2f3f42a9f96a69923eee1454dd0cfc9d698a09ecb7ad14f
SSDEEP
12288:ZdMqfZaSgVk4CPmKbScpLvujuYI5WEEl4qgmFUqvCW9DDE4+NzTb:zpSpCPTuOvpYII1PghqaW9DDQ
resource | yara_rule |
---|---|
static1/unpack001/4e0e4660d283270ae7abac2520b0bbd19324ff879c079ddb771c072bc7bbf60e.bin | family_mystic |
Checks for missing Authenticode signature.
resource |
---|
unpack001/4e0e4660d283270ae7abac2520b0bbd19324ff879c079ddb771c072bc7bbf60e.bin |
unpack001/4e1e7978279a0ae65856db0180a0fde56b17572d1483f15bf56a6875ac0c045a.bin |
unpack001/4f78fafd88db3a202cd19735892319e7de50ff4c8d949239316f8ea5270578ce.bin |
unpack001/53b125ce63cb17baee9c49fd3d7ae834ecac6168313ef7a92e46639262d96be3.bin |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteFile
GetLastError
WriteConsoleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
HeapReAlloc
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
DecodePointer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteConsoleInputW
GetConsoleAliasesLengthW
GetConsoleAliasExesA
ReadConsoleA
GetNamedPipeHandleStateA
GetModuleHandleExW
GetComputerNameW
FreeEnvironmentStringsA
FindNextVolumeMountPointA
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
FindResourceExA
GetConsoleCP
LoadLibraryW
GetLocaleInfoW
SwitchToFiber
DeleteVolumeMountPointW
InterlockedPopEntrySList
GetFileAttributesA
HeapQueryInformation
SetSystemPowerState
GetCompressedFileSizeA
MultiByteToWideChar
GetVolumePathNameA
GetStartupInfoW
DisconnectNamedPipe
FlushFileBuffers
GetShortPathNameA
SetDefaultCommConfigA
GetLastError
GetCurrentDirectoryW
SetLastError
PeekConsoleInputW
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
SetComputerNameA
GetTempFileNameA
LoadLibraryA
LocalAlloc
SetCalendarInfoW
CreateHardLinkW
AddAtomW
OpenJobObjectW
FindAtomA
GetTapeParameters
GetModuleHandleA
FindNextFileW
GetStringTypeW
VirtualProtect
PurgeComm
QueryPerformanceFrequency
GetShortPathNameW
FindFirstVolumeA
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ReadConsoleOutputCharacterW
GetCommandLineW
GetConsoleAliasesW
GetVolumeNameForVolumeMountPointA
WideCharToMultiByte
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
HeapReAlloc
HeapSetInformation
RaiseException
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringW
Sleep
SetStdHandle
GetConsoleMode
RtlUnwind
HeapSize
WriteConsoleW
ReadFile
CloseHandle
CreateFileW
CharUpperBuffA
CharUpperA
GetCharWidthA
GetKerningPairsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
QueryPerformanceCounter
IsDebuggerPresent
CreateEventW
GetModuleHandleA
DeleteFileA
DeleteFileW
CloseHandle
GetLastError
SetEvent
ResetEvent
CreateEventA
Sleep
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount64
VirtualAlloc
VirtualFree
FreeLibrary
GetProcAddress
LoadLibraryW
FormatMessageA
FormatMessageW
MoveFileExA
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
GetACP
GetConsoleMode
SetConsoleMode
SetConsoleCP
SetConsoleOutputCP
GetSystemInfo
WaitForSingleObjectEx
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
DisableThreadLibraryCalls
InitializeSListHead
GetCurrentProcess
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
RaiseException
SystemFunction036
_Cnd_destroy_in_situ
_Cnd_wait
_Cnd_signal
?_Throw_C_error@std@@YAXH@Z
?_Xbad_function_call@std@@YAXXZ
_Cnd_init_in_situ
_Mtx_lock
_Mtx_destroy_in_situ
_Mtx_init_in_situ
_Thrd_id
?_Xlength_error@std@@YAXPEBD@Z
_Mtx_unlock
__std_type_info_destroy_list
memmove
memcpy
memcmp
_CxxThrowException
__current_exception_context
__std_exception_copy
strchr
__current_exception
__C_specific_handler
__std_exception_destroy
_purecall
__std_terminate
memset
__CxxFrameHandler4
abort
_initialize_narrow_environment
_register_onexit_function
_seh_filter_dll
_crt_atexit
_cexit
_initterm
_initterm_e
_execute_onexit_table
_errno
_invalid_parameter_noinfo_noreturn
strerror
terminate
_initialize_onexit_table
_configure_narrow_argv
free
malloc
realloc
_callnewh
getenv
_get_osfhandle
_setmode
fwrite
fputc
_fileno
fflush
__acrt_iob_func
fclose
__stdio_common_vsprintf
strnlen
_stricmp
strcmp
_register_koffi_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteConsoleInputW
GetConsoleAliasesLengthW
GetConsoleAliasExesA
ReadConsoleA
GetNamedPipeHandleStateA
GetModuleHandleExW
GetComputerNameW
FreeEnvironmentStringsA
FindNextVolumeMountPointA
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
FindResourceExA
GetConsoleCP
LoadLibraryW
GetLocaleInfoW
SwitchToFiber
DeleteVolumeMountPointW
InterlockedPopEntrySList
GetFileAttributesA
HeapQueryInformation
SetSystemPowerState
GetCompressedFileSizeA
MultiByteToWideChar
GetVolumePathNameA
GetStartupInfoW
DisconnectNamedPipe
FlushFileBuffers
GetShortPathNameA
SetDefaultCommConfigA
GetLastError
GetCurrentDirectoryW
SetLastError
PeekConsoleInputW
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
SetComputerNameA
GetTempFileNameA
LoadLibraryA
LocalAlloc
SetCalendarInfoW
CreateHardLinkW
AddAtomW
OpenJobObjectW
FindAtomA
GetTapeParameters
GetModuleHandleA
FindNextFileW
GetStringTypeW
VirtualProtect
PurgeComm
QueryPerformanceFrequency
GetShortPathNameW
FindFirstVolumeA
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ReadConsoleOutputCharacterW
GetCommandLineW
GetConsoleAliasesW
GetVolumeNameForVolumeMountPointA
WideCharToMultiByte
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
HeapReAlloc
HeapSetInformation
RaiseException
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringW
Sleep
SetStdHandle
GetConsoleMode
RtlUnwind
HeapSize
WriteConsoleW
ReadFile
CloseHandle
CreateFileW
CharUpperBuffA
CharUpperA
GetCharWidthA
GetKerningPairsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ