Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
06-10-2023 14:31
231006-rvs2kafa68 1Static task
static1
Target
MDE_File_Sample_0b39336bf2b145cc8662ef73999379f8a45ee843749a3db3427ef3ce5ebf7458.zip
Size
1.8MB
MD5
ca54e312c5eccfc5d052a5ae25b3dfb7
SHA1
6f9f61ef4fe6f6a5946f575d5e5a7485d6b0faf4
SHA256
4e1240a29bd8f351055f5b7310a6b588d618d40e52315c92d352a1397391c3d7
SHA512
2361fa1b39cda0ac3f7baf0529a8a507a6660ee62ca77e0059ff58dc9ced1ee931b38547e1723fc7373bc4d68a925b62856d156b420e6cc5a2a61902722f9b2d
SSDEEP
24576:5PAjEmVKhORfcuoazzuFG0lQd4oWSVhwqilILrbeCp1y7ZcIGwi4uJnh4hNx/2IG:5VhORPNsauAOSfeCW7ZE4uJ6x/P2gtFu
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetMappedFileNameW
socket
recv
connect
closesocket
gethostbyname
send
WSACleanup
WSAStartup
gethostbyaddr
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WNetGetConnectionA
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueA
GetSidSubAuthority
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteKeyExA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
GetUserNameA
RegQueryValueExW
RegGetValueW
OpenProcessToken
RegEnumKeyExW
GetTokenInformation
MakeSelfRelativeSD
GetSecurityDescriptorLength
FreeSid
IsValidSecurityDescriptor
GetSecurityDescriptorControl
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetEntriesInAclW
GetSecurityDescriptorSacl
GetSidSubAuthorityCount
PathFileExistsW
PathFileExistsA
PathIsRelativeW
PathFindFileNameA
getsockopt
__WSAFDIsSet
WSAStringToAddressA
WSAGetLastError
FreeAddrInfoExW
FreeAddrInfoW
freeaddrinfo
select
WSASetLastError
setsockopt
sendto
FindWindowA
LoadIconA
LoadCursorA
DestroyWindow
CreateWindowExA
RegisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
EnumWindows
GetWindowThreadProcessId
GetForegroundWindow
GetKeyState
GetKeyboardLayoutNameA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
MoveWindow
PostMessageA
GetWindow
CharNextW
CharPrevA
UnregisterClassA
SetWindowLongPtrA
RemovePropA
GetPropA
SetPropA
SetCursor
IsWindowEnabled
CallWindowProcA
SendMessageA
GetWindowRect
GetWindowTextLengthA
GetFocus
wsprintfW
LoadStringA
CharNextA
KillTimer
SetTimer
IsWindow
SendMessageTimeoutA
RegisterWindowMessageA
GetParent
GetClassNameA
FindWindowExA
EnumChildWindows
GetWindowLongA
GetWindowTextA
IsWindowVisible
DefWindowProcA
PostThreadMessageA
GetUserObjectInformationA
GetProcessWindowStation
SetProcessWindowStation
CloseWindowStation
OpenWindowStationA
GetThreadDesktop
CloseDesktop
SetThreadDesktop
MapVirtualKeyA
GetKeyboardLayout
wsprintfA
CharPrevW
ExitProcess
GetFileInformationByHandle
GetDriveTypeW
GetFileType
GetModuleHandleExW
EnumSystemLocalesW
GetStdHandle
SetStdHandle
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlPcToFileHeader
IsValidLocale
SetFileAttributesW
GetCurrentDirectoryW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetStringTypeW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
IsDebuggerPresent
RtlUnwindEx
GetUserDefaultLCID
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
LoadLibraryExA
CompareStringA
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
CreateMutexA
ReadDirectoryChangesW
PostQueuedCompletionStatus
GetQueuedCompletionStatus
CreateIoCompletionPort
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
SuspendThread
GetThreadPriority
TerminateProcess
GetCurrentDirectoryA
SetCurrentDirectoryA
GetNumberFormatA
GetTimeZoneInformation
LocalReAlloc
ReleaseMutex
Process32FirstW
CreateToolhelp32Snapshot
Process32NextW
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
VerSetConditionMask
FlushFileBuffers
ReadFile
WriteFile
CloseHandle
ConnectNamedPipe
DisconnectNamedPipe
PeekNamedPipe
GetOverlappedResult
SetEvent
WaitForSingleObject
CreateEventA
GetTickCount
FreeLibrary
GetModuleFileNameA
GetProcAddress
LocalAlloc
WaitForMultipleObjects
LoadLibraryA
CreateNamedPipeA
CallNamedPipeA
VerifyVersionInfoW
CreateFileA
InitializeCriticalSection
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetCurrentThread
GetModuleHandleA
CreateThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetTempPathA
GetTempFileNameA
GetCommandLineA
CreateDirectoryA
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
GetCurrentProcessId
GetLocalTime
GetWindowsDirectoryA
GetFileAttributesExA
ResetEvent
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExA
LoadResource
LockResource
SizeofResource
lstrcmpiA
FindResourceA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
ExpandEnvironmentStringsA
GetDriveTypeA
SetFilePointerEx
GetTempPathW
QueryDosDeviceA
GetACP
GetTickCount64
SystemTimeToFileTime
GetModuleHandleW
FindClose
FindFirstFileA
FindNextFileA
SetFilePointer
LocalFree
GetSystemDirectoryA
GetTimeFormatA
GetLocaleInfoA
GetProcessTimes
GetSystemTimes
DuplicateHandle
OpenProcess
GetComputerNameA
VirtualProtect
VirtualQuery
IsBadStringPtrA
GetFileSize
QueryPerformanceCounter
QueryPerformanceFrequency
GetConsoleTitleA
SetConsoleTitleA
GetVersionExW
CreateFileMappingW
FormatMessageA
GetSystemTime
GetSystemTimeAsFileTime
GetProcessHeap
LockFileEx
UnlockFile
HeapDestroy
HeapCompact
HeapAlloc
LoadLibraryW
GetSystemInfo
HeapReAlloc
DeleteFileW
WaitForSingleObjectEx
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
FormatMessageW
HeapSize
HeapValidate
GetFileAttributesW
CreateFileW
CreateMutexW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
GetFullPathNameW
HeapFree
HeapCreate
AreFileApisANSI
TryEnterCriticalSection
lstrlenA
CreateEventW
GetModuleFileNameW
MoveFileA
ProcessIdToSessionId
ResumeThread
TerminateThread
SetWaitableTimer
CreateWaitableTimerW
CancelWaitableTimer
GetProcessId
GetStockObject
TranslateCharsetInfo
GetJobA
SHGetFolderPathA
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitialize
StringFromCLSID
CoTaskMemRealloc
CoCreateInstance
CreateStreamOnHGlobal
SysStringLen
SafeArrayUnaccessData
SysAllocString
SafeArrayAccessData
SysAllocStringLen
VariantChangeType
VariantCopy
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
VariantInit
SysFreeString
DllCanUnloadNow
DllGetClassObject
FreeResources
IAlloc
InitializeDll
SetPassthruFlag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ