Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
10928af06afd0db72eb6c26bb5733a00_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
10928af06afd0db72eb6c26bb5733a00_JC.exe
Resource
win10v2004-20230915-en
Target
10928af06afd0db72eb6c26bb5733a00_JC.exe
Size
625KB
MD5
10928af06afd0db72eb6c26bb5733a00
SHA1
ba6e149706b00bb3324b65eee34cf904a4469dd4
SHA256
fe91295d79e873ff237771650aee92b0bd85b449d244988176ee1567f0f83a1f
SHA512
85dc2a94e6baf547947d3ec175b9acc753296e5163f3ec7edd9390e5619d7873c7c3bc1645e8484c62195961b8e8528f7a1d5606ad36b6a1b9faf81fa1cf9b28
SSDEEP
12288:H0gUQlHHU/L1VXSm5v8v7X6EQE5OADRGzeAKTt:H1H0/L1V1vx4OQ15
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IsBadWritePtr
GetDriveTypeW
GetFullPathNameW
GetFileAttributesW
InterlockedIncrement
GetThreadLocale
InterlockedDecrement
GetLastError
GetProcAddress
LoadLibraryA
CloseHandle
SetEvent
ResetEvent
CreateEventW
InterlockedCompareExchange
FreeLibrary
LoadLibraryW
CreateFileW
lstrcmpiW
IsBadReadPtr
GetShortPathNameW
WideCharToMultiByte
AreFileApisANSI
IsDBCSLeadByte
MultiByteToWideChar
lstrcmpW
GlobalUnlock
GlobalLock
lstrcatW
lstrcpyW
SleepEx
GetModuleHandleExW
GetSystemWindowsDirectoryW
GetTickCount
GetProcessHeap
HeapAlloc
HeapValidate
HeapFree
HeapSize
HeapCompact
HeapReAlloc
InterlockedExchange
lstrlenA
WaitForSingleObject
OpenEventA
FindClose
FindFirstFileW
GetModuleFileNameW
LocalAlloc
LocalFree
lstrlenW
ReleaseActCtx
WaitForSingleObjectEx
DuplicateHandle
GetCurrentThread
GetCurrentProcess
Sleep
GetModuleHandleW
GetComputerNameW
DebugBreak
GetCurrentProcessId
FindActCtxSectionGuid
WaitForMultipleObjectsEx
InitializeCriticalSectionAndSpinCount
CreateThread
CreateActCtxW
LoadLibraryExW
DeactivateActCtx
ActivateActCtx
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
lstrcpynW
GetCurrentActCtx
CreateEventA
FreeLibraryAndExitThread
WriteProfileStringW
GetProfileStringW
RaiseException
OutputDebugStringW
ReadFile
SetFilePointer
GetStringTypeW
SetLastError
MapViewOfFileEx
CreateFileMappingW
MapViewOfFile
OpenFileMappingW
UnmapViewOfFile
ProcessIdToSessionId
LoadLibraryExA
ExpandEnvironmentStringsW
FindActCtxSectionStringW
GetSystemDirectoryW
GetSystemWow64DirectoryW
SearchPathW
FileTimeToDosDateTime
DosDateTimeToFileTime
SystemTimeToFileTime
GetSystemTime
GetLocaleInfoA
GetSystemInfo
OutputDebugStringA
CreateSemaphoreW
ReleaseSemaphore
TlsFree
TlsAlloc
TlsSetValue
TlsGetValue
IsProcessorFeaturePresent
GlobalFree
GlobalAlloc
GlobalSize
GlobalGetAtomNameW
GlobalDeleteAtom
GlobalGetAtomNameA
CreateProcessW
GlobalAddAtomW
GlobalAddAtomA
GlobalFindAtomW
GlobalReAlloc
LocalUnlock
LocalLock
GlobalFindAtomA
DeleteFileW
MulDiv
GetTempFileNameW
GetWindowsDirectoryW
GetTempPathW
GetOverlappedResult
EnterCriticalSection
SetEndOfFile
OpenProcess
LockFile
UnlockFile
GetFileTime
FlushViewOfFile
GlobalMemoryStatus
GetFileSize
FlushFileBuffers
VirtualAlloc
WriteFile
PulseEvent
GetFileType
InitializeCriticalSection
IsBadHugeWritePtr
IsBadHugeReadPtr
GetFileInformationByHandle
GetExitCodeThread
DeviceIoControl
GetUserDefaultLCID
GetACP
CreateFileMappingA
CompareStringA
CompareStringW
GetSystemDefaultLCID
DeleteCriticalSection
LeaveCriticalSection
AddRefActCtx
QueryPerformanceCounter
GetSystemTimeAsFileTime
InterlockedExchangeAdd
IsBadStringPtrW
GetFileAttributesExW
SetFileTime
lstrcmpA
GetCommandLineA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RevertToSelf
GetNamedSecurityInfoW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegOpenKeyW
OpenThreadToken
SetThreadToken
RegOpenKeyExW
RegCloseKey
WmiQuerySingleInstanceMultipleW
WmiQueryAllDataMultipleW
EqualSid
GetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
FreeSid
AllocateAndInitializeSid
RegEnumValueW
LookupPrivilegeNameW
ImpersonateSelf
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ