Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c824868b72b7a646f690a8faf48f33f0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c824868b72b7a646f690a8faf48f33f0_JC.exe
Resource
win10v2004-20231020-en
Target
NEAS.c824868b72b7a646f690a8faf48f33f0_JC.exe
Size
509KB
MD5
c824868b72b7a646f690a8faf48f33f0
SHA1
77c6213b75756438f5092d080da11cbdd7e2f3aa
SHA256
fddd186bec08130adbf838dc84fb647714087b7407f9fcafac42e7dd2129ec2d
SHA512
14436a28b73509f1bd62c86430fd51e0d7f7d6337e8379f5f97cd33c986123d43c3d22d74dc107c9714e5f51d3485c5227e18a8fa1f8a601712fd6adae645167
SSDEEP
12288:OwpOcVSCLnMgfg/wM8HH5SF9ZxfEBjvrEH74:ROctT89cH5e9ZxfurEH74
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathQuoteSpacesW
PathAppendW
PathIsDirectoryW
PathFileExistsW
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
lstrcmpiW
lstrcpyW
FindClose
FindFirstFileW
FindNextFileW
GetSystemTimeAsFileTime
GetLocalTime
SetEvent
GetSystemDefaultLangID
GetModuleFileNameW
Sleep
GetVersionExW
GetSystemDefaultLCID
lstrcmpW
LocalFree
GetFileAttributesW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
OpenProcess
GetExitCodeProcess
WaitForSingleObject
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringW
GetPrivateProfileStringW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetLastError
CreateMutexW
CloseHandle
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetSystemDirectoryW
SetLastError
lstrlenW
GlobalFree
GlobalAlloc
SetStdHandle
HeapSize
GetConsoleCP
CreateFileW
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
WriteConsoleW
CreateEventW
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
CharLowerW
OpenPrinterW
EnumPrintersW
XcvDataW
GetPrinterDriverW
ClosePrinter
RegisterServiceCtrlHandlerExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ReportEventW
DeregisterEventSource
RegisterEventSourceW
DeleteService
QueryServiceStatus
ControlService
StartServiceW
ChangeServiceConfig2W
CreateServiceW
SetServiceStatus
UnlockServiceDatabase
CloseServiceHandle
ChangeServiceConfigW
OpenServiceW
LockServiceDatabase
OpenSCManagerW
StartServiceCtrlDispatcherW
RegOpenKeyW
RegEnumValueW
RegCreateKeyExW
RegEnumKeyW
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHGetFolderPathW
CoUninitialize
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ