Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.31199cdf42a779f3ac217a07bd4a1460.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.31199cdf42a779f3ac217a07bd4a1460.exe
Resource
win10v2004-20231025-en
Target
NEAS.31199cdf42a779f3ac217a07bd4a1460.exe
Size
406KB
MD5
31199cdf42a779f3ac217a07bd4a1460
SHA1
2ca95d1ab364640e42d0be84c7e935c500f3ee87
SHA256
008891e73e703653da5705aa1f6fca994a941d2b35899fccc9277a8b9f9dc8d7
SHA512
71d5cf464a4addccde5bab60346aa879b62c5718d6bdbcedb8b09c6c0d07cc4525334522811c07c5db8d7ae0c25f65feb6025b43c3639e4150724c1cb35a6e12
SSDEEP
6144:28kDfcU4Eu+c30rxsibiLV3Wss60UGZIOvbTK:2HcU4Eu+c3+xVOmVK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetCurrentPowerPolicies
lstrcmpiA
CloseHandle
GetLocaleInfoA
GetUserDefaultUILanguage
TerminateProcess
GetExitCodeProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
FindClose
FindFirstFileA
GetModuleFileNameA
GetModuleHandleW
DeleteFileA
GetVersionExA
CreateProcessA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
lstrlenA
Sleep
LoadLibraryA
CreateMutexA
GetCurrentThreadId
GetCommandLineA
HeapQueryInformation
HeapReAlloc
HeapCreate
GetModuleHandleA
GetProcAddress
GetLastError
SetEndOfFile
ReadFile
GetConsoleOutputCP
WriteConsoleA
CreateFileA
SetStdHandle
SetFilePointer
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
CompareFileTime
GetSystemPowerStatus
QueryPerformanceCounter
LoadLibraryExA
OutputDebugStringW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapSetInformation
HeapAlloc
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
LoadLibraryW
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
SetEvent
OpenEventA
OutputDebugStringA
ExitProcess
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
VirtualAlloc
UnmapViewOfFile
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetCurrentThread
HeapFree
GetProcessHeap
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
VirtualProtect
VirtualQuery
HeapSize
HeapValidate
IsBadReadPtr
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlCaptureContext
GetCurrentProcess
IsDebuggerPresent
RtlVirtualUnwind
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsAlloc
FlsFree
SetLastError
DebugBreak
GetStdHandle
WriteFile
WriteConsoleW
GetFileType
GetTickCount
KillTimer
SetTimer
CharNextW
PostThreadMessageA
CharNextA
EnumDisplaySettingsA
ChangeDisplaySettingsExA
RegisterClassA
CreateWindowExA
DispatchMessageA
GetMessageA
PostQuitMessage
RegisterDeviceNotificationA
DefWindowProcA
EnumDisplayDevicesA
SendNotifyMessageA
FindWindowA
RegisterWindowMessageA
PostMessageA
ChangeDisplaySettingsA
RegQueryInfoKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
SetThreadToken
RevertToSelf
OpenThreadToken
RegOpenKeyA
SHGetFolderPathA
ShellExecuteExA
SHCreateDirectoryExA
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoSuspendClassObjects
CoTaskMemAlloc
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysFreeString
SysAllocString
VariantClear
LoadSTRING
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ