Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
bjx.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bjx.exe
Resource
win10v2004-20230915-en
Target
bjx.exe
Size
333KB
MD5
2e4d4222a96b0cfc8944862b32e40e0f
SHA1
a1d7cba9144d45aca85241ac32f6b6cd8dcd5e76
SHA256
ead8da37352da0144c5dc4b7cb5db9f5cb895a72ab1ddf1ee744e76ca63b9bef
SHA512
e0dad98f4ab829039455a6cd5e56a8cd85fe02035cffefa092def733859dd8a426f3df568c7b86bf332bbe676836d38873db993c716d7fc47f93c32ebc19c88e
SSDEEP
6144:rz0kuvJrx3ja1K+7J4qfBmi8E+4IA4m+U6cTpgj1ghM1dd1dwbRX0Ugy6r:rRuvhw1bzmi8EVIdFU6cTpgJrbmbRE3
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
CreateEventW
GetLastError
SetLastError
GlobalMemoryStatusEx
VirtualAlloc
VirtualFree
VirtualQuery
GetSystemInfo
GetTickCount
CreateProcessW
GetCommandLineW
GetCurrentThreadId
QueryPerformanceCounter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentProcess
IsBadReadPtr
IsBadCodePtr
GetModuleHandleA
CloseHandle
GetProcAddress
GetCurrentProcessId
TerminateProcess
InterlockedIncrement
InterlockedDecrement
SetEvent
WaitForSingleObjectEx
WriteProcessMemory
OpenThread
SuspendThread
ResumeThread
RtlCaptureContext
FreeLibrary
VirtualQueryEx
SetUnhandledExceptionFilter
CreateThread
GetProcessId
TerminateThread
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreW
LoadLibraryW
CreateFileW
ResetEvent
WaitForMultipleObjects
WriteFile
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
RtlUnwind
WriteConsoleW
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetTimeZoneInformation
MoveFileExW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LoadLibraryExW
GetFileType
RaiseException
GetACP
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCommandLineA
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetModuleHandleW
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
UnhandledExceptionFilter
UnDecorateSymbolName
SymGetModuleInfo
SymGetLineFromAddr
SymUnDName
SymGetSymFromAddr
cef_log
cef_string_list_copy
cef_string_list_value
cef_string_list_size
cef_string_utf16_cmp
cef_string_map_free
cef_string_map_alloc
cef_execute_process
cef_string_list_free
cef_string_list_alloc
cef_string_userfree_utf16_free
cef_string_utf16_clear
cef_string_utf16_set
cef_string_multimap_free
cef_string_multimap_alloc
cef_string_multimap_append
cef_string_multimap_value
cef_string_multimap_key
cef_string_multimap_size
cef_string_map_append
cef_string_map_key
cef_string_map_value
cef_string_map_size
cef_string_list_append
cef_api_hash
SystemFunction036
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE