Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
799028c8353a7cea6d6479ef00811f7a97b3bc222e400ceb7bb81ba0e9206330.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
799028c8353a7cea6d6479ef00811f7a97b3bc222e400ceb7bb81ba0e9206330.exe
Resource
win10v2004-20231020-en
Target
799028c8353a7cea6d6479ef00811f7a97b3bc222e400ceb7bb81ba0e9206330.exe.zip
Size
1.3MB
MD5
d5659a564e0ba9333909a66c01b5eb8e
SHA1
fb17b97f0d826d724e5114c4688cbb9276cad67a
SHA256
fc8065ad1c1e6a5ddb323810e416aed43eba1089280559688b48cf1e64163c48
SHA512
df8bd30a88023f63c4c6e053a97e815209a1d34409be616c8814422e9adaca73ff4b44c246a94a8e23bdb321b4b5728a0df0822c29c7995bf060bdecd537a5f8
SSDEEP
24576:D1o+bz2Wt7veVswvfIWRYPM2F0r/+rHtIgIzCYo8+glyoS2aQ4cA+qjKTD0K3c:asjmVsijmDjtI/C9g5rUK3c
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CryptQueryObject
CertCloseStore
CertEnumCertificatesInStore
CryptHashCertificate
CertOpenStore
CertNameToStrW
CertFreeCertificateContext
RtlCaptureContext
RtlLookupFunctionEntry
RtlCaptureStackBackTrace
RtlVirtualUnwind
NtQueryKey
RtlPcToFileHeader
RtlUnwindEx
GetUserNameExW
UnregisterTraceGuids
LookupPrivilegeValueW
GetTokenInformation
EqualSid
DuplicateToken
CreateRestrictedToken
CreateWellKnownSid
CopySid
GetSecurityInfo
SetSecurityInfo
ImpersonateNamedPipeClient
SetKernelObjectSecurity
LookupPrivilegeValueA
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
SystemFunction036
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
RegOverridePredefKey
OpenProcessToken
DuplicateTokenEx
GetLengthSid
SetTokenInformation
ConvertStringSidToSidW
RevertToSelf
RegDisablePredefinedCache
SetThreadToken
ConvertSidToStringSidW
GetAce
GetKernelObjectSecurity
GetSecurityDescriptorSacl
DisconnectNamedPipe
GetFileInformationByHandleEx
ReleaseSemaphore
GetUserDefaultUILanguage
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
CreateNamedPipeW
WaitNamedPipeW
LocalFree
GetLastError
ConnectNamedPipe
CloseHandle
DuplicateHandle
GetCurrentProcess
SetLastError
ResumeThread
SetEvent
CreateEventW
WaitForMultipleObjects
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FormatMessageA
QueryDosDeviceW
Sleep
HeapCreate
HeapDestroy
WriteFile
OutputDebugStringA
GetModuleFileNameW
DeleteFileW
GetLocalTime
GetCurrentDirectoryW
GetTickCount
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetCommandLineW
GetProcAddress
GetModuleHandleW
GetProcessId
GetSystemInfo
GetProcessTimes
VirtualQueryEx
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
SleepConditionVariableSRW
CreateDirectoryW
ReadFile
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
UnmapViewOfFile
SetFileAttributesW
GetFileAttributesExW
SetCurrentDirectoryW
ReplaceFileW
CopyFileW
GetTempFileNameW
CreateFileMappingW
MapViewOfFile
MoveFileW
SetPriorityClass
TerminateProcess
WaitForSingleObject
OpenProcess
GetExitCodeProcess
SetInformationJobObject
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
CreateSemaphoreW
ExpandEnvironmentStringsW
GetModuleHandleA
SetThreadPriority
QueryThreadCycleTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
GetCurrentThread
QueryPerformanceFrequency
GetThreadPriority
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateThread
IsDebuggerPresent
ResetEvent
GetVersionExW
GetNativeSystemInfo
VirtualQuery
QueueUserWorkItem
GetUserDefaultLangID
GetFileSizeEx
SetFileTime
SetEndOfFile
GetFileInformationByHandle
SetFilePointerEx
FlushFileBuffers
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetThreadId
HeapSetInformation
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleExW
LoadLibraryW
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetUnhandledExceptionFilter
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
ReleaseSRWLockShared
AcquireSRWLockShared
QueryFullProcessImageNameW
FreeLibrary
GlobalFree
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualAllocEx
WriteProcessMemory
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetThreadLocale
CreateFileA
GetTimeZoneInformation
CancelIo
VirtualProtectEx
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateRemoteThread
ReadProcessMemory
DebugBreak
lstrlenW
SearchPathW
WideCharToMultiByte
SetFilePointer
InitOnceExecuteOnce
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
ReleaseMutex
CreateMutexA
CreateFileMappingA
SleepEx
GetVersion
LockFileEx
UnlockFileEx
SetNamedPipeHandleState
TransactNamedPipe
SetProcessShutdownParameters
SetConsoleCtrlHandler
SuspendThread
GetThreadContext
Wow64GetThreadContext
IsProcessorFeaturePresent
GetSystemDefaultLCID
ReadConsoleW
GetDriveTypeW
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
GetACP
ExitProcess
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
LoadLibraryExW
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
UnhandledExceptionFilter
WaitForSingleObjectEx
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
GetStringTypeW
MultiByteToWideChar
VirtualProtect
LoadLibraryExA
PeekNamedPipe
CreateProcessW
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
SysAllocString
VariantClear
SysFreeString
SysAllocStringByteLen
GetMappedFileNameW
GetModuleFileNameExW
GetProcessMemoryInfo
EnumProcesses
EnumProcessModulesEx
CommandLineToArgvW
SHGetFolderPathW
SHGetKnownFolderPath
SetTimer
GetMessageW
GetWindowLongPtrW
DispatchMessageW
SetWindowLongPtrW
DestroyWindow
RegisterClassW
CloseDesktop
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowExW
PostMessageW
CreateWindowStationW
PeekMessageW
MsgWaitForMultipleObjectsEx
GetQueueStatus
TranslateMessage
KillTimer
PostQuitMessage
UnregisterClassW
DefWindowProcW
GetProcessWindowStation
SetProcessWindowStation
RegisterClassExW
GetUserObjectInformationW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
InternetCheckConnectionW
timeEndPeriod
timeBeginPeriod
timeGetTime
NotifyAddrChange
CancelIPChangeNotify
WinHttpGetIEProxyConfigForCurrentUser
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpAddRequestHeaders
WinHttpSetTimeouts
WinHttpWriteData
WinHttpCrackUrl
WinHttpGetProxyForUrl
WinHttpSetStatusCallback
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
DeleteAtExit
ESETCancelScan
ESETEndScan
ESETInitialize
ESETInitializeSandboxTarget
ESETRegisterTargetProcess
ESETShutdown
ESETStartCleanup
ESETStartSandboxTarget
ESETStartScan
ESETTargetProcessStarted
GetHandleVerifier
IsSandboxedProcess
yr_filemap_map
yr_filemap_map_ex
yr_filemap_map_fd
yr_filemap_unmap
yr_filemap_unmap_fd
yr_finalize
yr_finalize_thread
yr_get_configuration
yr_get_tidx
yr_hash_table_add
yr_hash_table_add_raw_key
yr_hash_table_clean
yr_hash_table_create
yr_hash_table_destroy
yr_hash_table_lookup
yr_hash_table_lookup_raw_key
yr_initialize
yr_object_print_data
yr_rules_define_boolean_variable
yr_rules_define_float_variable
yr_rules_define_integer_variable
yr_rules_define_string_variable
yr_rules_destroy
yr_rules_load
yr_rules_load_stream
yr_rules_save
yr_rules_save_stream
yr_rules_scan_fd
yr_rules_scan_file
yr_rules_scan_mem
yr_rules_scan_mem_blocks
yr_rules_scan_proc
yr_set_configuration
yr_set_tidx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ