Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f02a27654827a7086396ced2b1103220_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f02a27654827a7086396ced2b1103220_JC.exe
Resource
win10v2004-20231023-en
Target
NEAS.f02a27654827a7086396ced2b1103220_JC.exe
Size
1.1MB
MD5
f02a27654827a7086396ced2b1103220
SHA1
919abe9634538c41854eb4e90708d388c5a422e9
SHA256
cda25f680fce2ea08e7e3fc1b7a1f792e56ede22b2d5df167264f2cd87e50814
SHA512
126c8b1df770b39cc9c4f25c29e4407dbc4af7752d7b0ce7fdc866bd5deb71b16906bf85ba3b387414126814143785ea77e93a8e886904d8d957b5a6151fdbc5
SSDEEP
12288:Tq+e48dJWBKlUgF1J0stz9o4D1DeDecOMehHgSDv0e9+nK+kOFHZz:Tqh4AXlU61JTw4DteDNehK5z
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SetHandleInformation
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
ExpandEnvironmentStringsW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
VirtualFreeEx
ReadProcessMemory
GetCurrentDirectoryW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
FreeLibrary
GetModuleHandleExW
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
HeapCreate
CreateMutexW
UnmapViewOfFile
GetCommandLineW
ReadFile
SetCurrentDirectoryW
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
SearchPathW
lstrlenW
DebugBreak
GetFileType
HeapFree
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SetEnvironmentVariableW
SwitchToThread
InitOnceExecuteOnce
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleOutputCP
RtlUnwind
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetThreadPriority
SetThreadPriority
GetThreadId
CloseHandle
RaiseException
GetModuleHandleW
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
IsWow64Process
GetNativeSystemInfo
GetProductInfo
GetVersionExW
GetTickCount
HeapDestroy
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DuplicateHandle
WaitForSingleObject
PostQueuedCompletionStatus
TerminateJobObject
RegisterWaitForSingleObject
UnregisterWait
SetEvent
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetCurrentProcess
SetProcessDEPPolicy
HeapSetInformation
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryW
HeapAlloc
GetModuleFileNameW
GetStringTypeW
LCMapStringEx
MultiByteToWideChar
DecodePointer
EncodePointer
InitializeCriticalSectionEx
WriteConsoleW
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
CloseDesktop
CloseWindowStation
GetThreadDesktop
GetUserObjectInformationW
EventWriteTransfer
EventUnregister
EventRegister
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
CoTaskMemFree
PathRemoveFileSpecW
PathAppendW
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE