Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.66c5cb841bd886021782fce9a3519ac0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.66c5cb841bd886021782fce9a3519ac0.exe
Resource
win10v2004-20230915-en
Target
NEAS.66c5cb841bd886021782fce9a3519ac0.exe
Size
1011KB
MD5
66c5cb841bd886021782fce9a3519ac0
SHA1
07bfc0125e6fcb1fbe7ea309b0407a4e43f7ed5e
SHA256
8251841db264e57c30adb03a780f36ae4219e6b57856a884f03de320940ddab8
SHA512
80edd3b6503180fa43c21d546a921d290d614fb1d610d3d283d42daaa6e8a0dcc0be8a68d6f60a02a0d9c61f55ea4e572490ec286dbb070e91e3ce1ab98cf17a
SSDEEP
24576:pc+FGxeTNBF6kUCBaqWlIWPclVHzbEnKvKAiWsj55iA:NrzBaXXyzbEKzTsj55
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
GetComputerNameW
MoveFileExW
CopyFileW
DeleteFileW
GetWindowsDirectoryW
GetCommandLineW
CreateProcessW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryExW
LoadLibraryW
SetWaitableTimer
CreateWaitableTimerW
CreateEventW
OpenMutexW
CreateMutexW
lstrcmpiW
FileTimeToSystemTime
GetFileTime
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
SetEvent
LeaveCriticalSection
EnterCriticalSection
SetErrorMode
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
GetProcAddress
FreeLibrary
InterlockedCompareExchange
InterlockedExchange
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
CreateFileW
CreateDirectoryW
GetCurrentDirectoryW
LocalFileTimeToFileTime
SystemTimeToFileTime
CloseHandle
SetFileTime
SetFilePointer
ReadFile
WriteFile
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetLastError
GetProcessHeap
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetStdHandle
ExitProcess
GetModuleHandleExW
ExitThread
RtlUnwind
CreateTimerQueue
HeapSize
HeapFree
HeapReAlloc
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
HeapAlloc
HeapDestroy
LockResource
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
IsDebuggerPresent
OutputDebugStringW
TryEnterCriticalSection
QueryPerformanceCounter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
LoadStringW
GetMessageW
MessageBoxW
CharNextW
CharUpperW
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetSecurityDescriptorSacl
RegisterEventSourceW
ReportEventW
OpenProcessToken
GetTokenInformation
IsValidSid
SetNamedSecurityInfoW
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptGetHashParam
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
StartServiceW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
SetFileSecurityW
MakeAbsoluteSD
MakeSelfRelativeSD
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSidLengthRequired
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
InitializeSecurityDescriptor
AddAce
GetAclInformation
InitializeAcl
CopySid
GetLengthSid
GetSidSubAuthority
InitializeSid
DeregisterEventSource
SHGetFolderPathW
CoReleaseServerProcess
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromCLSID
CoUninitialize
CoAddRefServerProcess
VariantClear
VarUI4FromStr
SysAllocStringLen
SysFreeString
SysAllocString
PathAppendW
PathCombineW
PathFileExistsW
PathRemoveArgsW
PathRemoveExtensionW
PathRemoveFileSpecW
PathUnquoteSpacesW
PathStripPathW
PathRenameExtensionW
CryptBinaryToStringA
CryptStringToBinaryA
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpSendRequest
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpCrackUrl
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
CheckSumMappedFile
GetModuleFileNameExW
GetUdpTable
GetTcpTable
ntohs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ