Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20230915-en
Target
10f34bae6b11a02a4ff7e6aa26d31d683318a0dabe3261dfaed2ad1eea5e57c4.zip
Size
9KB
MD5
7a91ef20cdd59ee3c6628572116f8ad9
SHA1
1b1f22bbace2a234928ed91c8ef9a10ad5020758
SHA256
508fffd252aaac43d6d9da49eff22ab21208d7da530e099c4a0450a8eaed779a
SHA512
4091579b92a267bccd5c8fed68017c8807265a92700390f2e81968ee38e0586abd9314728165570a5065303e3cd31678e7ff799d5ed08dfc5870b66d88bc2cdf
SSDEEP
192:iLxnlqYtmRQWzBO/5PvZM96BqrQf0DEkEr6yzb9wI+ZAyjk9zcj/5+:yxlfqwZMcor5DEdrfZHyKzck
systembc
ventafones.com:64443
straightsboycott.com:64443
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadCursorA
LoadIconA
PostQuitMessage
RegisterClassA
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
CreateWindowExA
GetMessageA
DispatchMessageA
DefWindowProcA
WaitForSingleObject
WriteFile
SetFilePointer
VirtualFree
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateThread
ExitProcess
FileTimeToSystemTime
GetCommandLineA
GetCurrentProcess
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetTempPathA
GetVolumeInformationA
LocalAlloc
LocalFree
OpenMutexA
SetEvent
VirtualAlloc
Sleep
SystemTimeToFileTime
RegOpenKeyExA
GetTokenInformation
OpenProcessToken
RegCloseKey
RegSetValueExA
GetSidSubAuthority
RegDeleteValueA
RegCreateKeyExA
closesocket
connect
inet_addr
inet_ntoa
ioctlsocket
recv
select
send
setsockopt
shutdown
socket
htons
WSAStartup
freeaddrinfo
WSAIoctl
getaddrinfo
CoUninitialize
CoInitialize
CoCreateInstance
GetUserNameExA
AcquireCredentialsHandleA
DecryptMessage
DeleteSecurityContext
EncryptMessage
FreeContextBuffer
FreeCredentialsHandle
GetUserNameExW
QueryContextAttributesA
InitializeSecurityContextA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ