Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SPClientSvc47350.exe
Resource
win10v2004-20231020-en
Target
MDE_File_Sample_dbaf1eeb1794d203b1117778aa71259d9af64500.zip
Size
1.1MB
MD5
a70eabe080c6f6243f585e92c76ec94e
SHA1
75cde09df52dacfbb8af3737214b2ac5e676ac14
SHA256
90a3904ab16b67f09f17e3e1915449bef05bb68d53bb88c7a30071b53edb582a
SHA512
2b8fc9d03c1c5587a17212823b8a3a0a58999e0413e12fe16e4d01cd3c4a5a3f514a2cf63b9b241f63cee488dd4f9c3d6d9f8b9203213e621c55545617ea94d2
SSDEEP
12288:4bqul/UUDTALrJAPS1LvdaURtWIqwx8FBI0SmAyzEDrEhw+TGVGmz6rY9EalE08u:Ful8UDTA/K8dhtrOBd4+agY9lEZ5r2Z3
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStockObject
GetDeviceCaps
DeleteDC
CreateDCA
gethostname
ntohl
ntohs
ioctlsocket
accept
bind
closesocket
inet_ntoa
setsockopt
getpeername
getsockname
getsockopt
htonl
htons
shutdown
WSAStartup
listen
WSACleanup
WSASetLastError
WSAGetLastError
gethostbyname
ord1142
ord1141
WTSQueryUserToken
WTSEnumerateSessionsA
WTSFreeMemory
WTSQuerySessionInformationA
WTSEnumerateSessionsW
WTSQuerySessionInformationW
NetApiBufferFree
NetWkstaGetInfo
wsprintfW
EnumDisplaySettingsA
UnregisterClassA
wsprintfA
GetForegroundWindow
GetSystemMetrics
GetCursorPos
MessageBoxA
GetWindowTextA
MapVirtualKeyExA
MapVirtualKeyA
GetKeyNameTextA
SetCursor
LoadCursorA
MessageBoxW
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
SetTimer
GetKeyboardLayout
LoadStringA
KillTimer
PostMessageA
DefWindowProcA
RegisterClassA
CreateWindowExA
DestroyWindow
SetPropA
GetPropA
LoadIconA
PostQuitMessage
IsWindow
ShowWindow
CreateDialogParamA
EndDialog
UpdateWindow
CharNextW
CharPrevW
EnumDisplayMonitors
FreeSid
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetKeySecurity
RegSetValueExW
RegOpenKeyExW
RegGetValueW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
RegEnumValueW
RegQueryValueExW
LookupPrivilegeValueA
RegQueryValueExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetFileSecurityA
RegDeleteValueA
StartServiceA
StartServiceCtrlDispatcherA
SetServiceStatus
RegisterServiceCtrlHandlerExA
GetSecurityInfo
SetEntriesInAclA
GetTokenInformation
InitiateSystemShutdownA
RegConnectRegistryA
RegEnumKeyExA
GetSecurityDescriptorSacl
SetSecurityDescriptorOwner
AllocateAndInitializeSid
GetSecurityDescriptorControl
SetSecurityDescriptorSacl
IsValidSecurityDescriptor
RegGetKeySecurity
GetSecurityDescriptorLength
MakeSelfRelativeSD
SetSecurityDescriptorGroup
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
OpenProcessToken
CreateProcessAsUserA
AdjustTokenPrivileges
DuplicateTokenEx
ImpersonateLoggedOnUser
RevertToSelf
DeregisterEventSource
RegisterEventSourceA
ReportEventA
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceStatus
PathAppendA
PathRemoveFileSpecA
PathAddBackslashA
PathFileExistsA
WSASend
WSASocketW
WSAAddressToStringW
getaddrinfo
freeaddrinfo
getnameinfo
WSAStringToAddressA
__WSAFDIsSet
connect
recv
recvfrom
select
send
sendto
socket
WSARecv
WSARecvFrom
WSAPoll
WSASendTo
GetTcp6Table2
GetTcpTable2
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
HeapReAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFullPathNameW
SetStdHandle
GetConsoleCP
GetConsoleMode
ReadConsoleW
HeapSize
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCommandLineA
RtlUnwind
ExitThread
GetVersionExW
SetFileAttributesW
GetCurrentDirectoryW
CreatePipe
GetConsoleWindow
GetStdHandle
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
GetStringTypeW
LoadLibraryExW
InterlockedFlushSList
GetCommandLineW
DecodePointer
RaiseException
GetLastError
DeleteTimerQueueTimer
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThread
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
CreateFileA
CloseHandle
DeviceIoControl
SetEvent
WaitForSingleObject
CreateEventA
WaitForMultipleObjects
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
VerSetConditionMask
SetLastError
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SleepEx
SetWaitableTimer
QueueUserAPC
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ProcessIdToSessionId
LocalFree
FormatMessageA
CreateWaitableTimerA
VerifyVersionInfoA
WideCharToMultiByte
DeleteFileA
OutputDebugStringA
SetCurrentDirectoryA
GetCurrentDirectoryA
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFileSize
GetFileTime
ReadFile
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetFileTime
WriteFile
SetThreadPriority
ResumeThread
GetTickCount
GetSystemDirectoryA
CopyFileA
MoveFileA
VerifyVersionInfoW
GetCurrentProcess
IsWow64Process
GetVolumeInformationA
LoadLibraryA
TerminateProcess
GetExitCodeProcess
OpenProcess
GetTickCount64
Sleep
GetCurrentProcessId
CreateProcessA
lstrlenA
GetComputerNameA
RemoveDirectoryA
GetWindowsDirectoryA
WinExec
MoveFileExA
GetTempPathA
GetTempFileNameA
ReleaseMutex
CreateMutexA
CreateThread
GetComputerNameW
ResetEvent
GetSystemTime
GetLocalTime
GetCurrentThreadId
GetExitCodeThread
MultiByteToWideChar
CreateNamedPipeA
DuplicateHandle
DisconnectNamedPipe
CreateEventW
GetOverlappedResult
ConnectNamedPipe
SetNamedPipeHandleState
CreateFileW
WaitNamedPipeW
FlushFileBuffers
Process32NextW
CreateProcessW
CreateWaitableTimerW
CancelWaitableTimer
CreateToolhelp32Snapshot
Process32FirstW
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
CreateNamedPipeW
LocalAlloc
GetModuleFileNameW
GetModuleHandleW
SetFilePointerEx
CreateMutexW
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
TryEnterCriticalSection
LocalReAlloc
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualQuery
CreateDirectoryA
GetDriveTypeA
GetProcessHeap
GetThreadPriority
GetSystemInfo
SetUnhandledExceptionFilter
CreateDirectoryW
ExpandEnvironmentStringsA
GetSystemWow64DirectoryA
GetACP
IsDebuggerPresent
OutputDebugStringW
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
QueryPerformanceFrequency
FormatMessageW
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
InterlockedPushEntrySList
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
WaitNamedPipeA
InitializeCriticalSectionEx
CoCreateGuid
StringFromCLSID
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoInitialize
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderPathA
SysFreeString
SysAllocStringLen
VariantChangeType
VariantClear
VariantInit
SysAllocString
LsaEnumerateLogonSessions
LsaFreeReturnBuffer
LsaGetLogonSessionData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ