Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
290a33cc02ba7d6fdf0b7bab886749a4b89702686f7b614fcc806b8eefff2421.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
290a33cc02ba7d6fdf0b7bab886749a4b89702686f7b614fcc806b8eefff2421.exe
Resource
win10v2004-20230915-en
Target
290a33cc02ba7d6fdf0b7bab886749a4b89702686f7b614fcc806b8eefff2421
Size
705KB
MD5
98abce6b109edca76b71e3615e45d6eb
SHA1
4c0861a0df5046cef55e4e937a595accdfc31f10
SHA256
290a33cc02ba7d6fdf0b7bab886749a4b89702686f7b614fcc806b8eefff2421
SHA512
b7a01714bdcb348c4f85eba3cb5c74a839627a1957721dbf89c1382198362d2d2e668ed64594435963f8071297f090be589dd9c2237c430b7604ddf56d198bc7
SSDEEP
12288:dNBCE67xGQfigpkmZMN1lBwXBl9kTDy7orPyAEX0fbB:dqE699fCm+N1lKB/kTMorPyAEEfd
metasploit
encoder/shikata_ga_nai
metasploit
windows/reverse_tcp
192.168.3.42:345
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
CreateProcessAsUserW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SystemFunction036
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
LookupPrivilegeValueW
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
GetAdaptersAddresses
GetAdaptersInfo
GetMappedFileNameW
GetActiveWindow
CharUpperW
CloseDesktop
RegisterWindowMessageW
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutW
FindWindowW
CreateEnvironmentBlock
DestroyEnvironmentBlock
gethostbyname
inet_ntoa
WSAGetLastError
WSAStartup
gethostname
InternetConnectW
InternetOpenW
InternetSetOptionW
FtpPutFileW
InternetCloseHandle
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
timeGetTime
PathFindFileNameW
RtlCaptureStackBackTrace
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetProcessHeap
WriteConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
HeapReAlloc
CloseHandle
GetLastError
CreateMutexW
CreateDirectoryW
lstrcpyW
lstrlenW
GetCurrentProcess
GetModuleHandleW
FreeLibrary
GetProcAddress
LoadLibraryExW
SetLastError
GetCurrentProcessId
GetSystemInfo
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WriteFile
OutputDebugStringA
GetModuleFileNameW
CreateFileW
DeleteFileW
FormatMessageA
GetTickCount
GetCommandLineW
LocalFree
ReadFile
QueryDosDeviceW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
GetCurrentDirectoryW
MoveFileExW
CopyFileW
GetTempFileNameW
SetThreadPriority
Sleep
GetCurrentThread
QueryPerformanceFrequency
GetThreadPriority
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetUserDefaultLangID
TerminateProcess
WaitForSingleObject
DuplicateHandle
OpenProcess
GetExitCodeProcess
SetInformationJobObject
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
ResumeThread
CreateProcessW
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetCurrentThreadId
GetVersionExW
GetNativeSystemInfo
IsDebuggerPresent
RaiseException
CreateThread
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
GetProcessId
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
GetModuleHandleA
CreateEventW
GetModuleHandleExW
SetEnvironmentVariableW
GetEnvironmentVariableW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
LoadLibraryW
GlobalMemoryStatusEx
HeapSetInformation
WaitForMultipleObjects
SetEvent
ResetEvent
VirtualQueryEx
RtlCaptureContext
ReleaseSemaphore
InitializeCriticalSection
SuspendThread
TerminateThread
GetThreadContext
CreateSemaphoreW
SetUnhandledExceptionFilter
GetDriveTypeW
VirtualAlloc
VirtualFree
ReleaseMutex
SwitchToThread
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
ReadProcessMemory
DebugBreak
SearchPathW
HeapFree
HeapAlloc
ExitProcess
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
FileTimeToSystemTime
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
VirtualQuery
VirtualProtect
CoTaskMemFree
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
WinHttpOpen
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ