Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a5a656f8283872636e70dc13482c2020_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.a5a656f8283872636e70dc13482c2020_JC.exe
Resource
win10v2004-20231025-en
Target
NEAS.a5a656f8283872636e70dc13482c2020_JC.exe
Size
2.5MB
MD5
a5a656f8283872636e70dc13482c2020
SHA1
3c176ab3247dc48c50714f8ca55b63399fa8b381
SHA256
1ff2cd9cdc5411cb9ee7ba2b1607369b86dbd31027c6d473b198186fdfef6733
SHA512
630839d22be94281c2ba17172e9f4060dd947f2b2172b352743bdec3f52adfa14b18c3b3121659a7052ef0e55ff7d54e03ee45e1f58762102b370e62b024dcc0
SSDEEP
49152:YdkDdXxHt7L46ky1+nhUZ6wD/L1mvDPI+0IFjktLyjwYWlkssvNEfH9so:Ydedh1LSy1+nU/AvDPIywY2ssH9
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
EventWrite
EventRegister
EventUnregister
OpenTraceW
ProcessTrace
CloseTrace
StartTraceW
ControlTraceW
GetLengthSid
EnableTrace
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegDeleteTreeW
RegGetValueW
OpenProcessToken
GetTokenInformation
RevertToSelf
EventWriteTransfer
OpenThreadToken
CopySid
GetSidSubAuthority
IsValidSid
AddAccessAllowedAce
AddAccessDeniedAce
AllocateAndInitializeSid
CheckTokenMembership
CreateWellKnownSid
EqualSid
FreeSid
GetSecurityDescriptorDacl
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegNotifyChangeKeyValue
CreateProcessAsUserW
GetSidSubAuthorityCount
CredWriteW
CloseServiceHandle
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
QueryServiceStatusEx
K32GetModuleFileNameExW
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
OpenProcess
OutputDebugStringA
CreateThread
GetModuleHandleA
LoadLibraryW
FlsGetValue
FlsSetValue
ReleaseSemaphore
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
CreateEventW
GetTickCount
QueryFullProcessImageNameW
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
GetCurrentThread
GetProcessAffinityMask
SetThreadAffinityMask
WaitForMultipleObjectsEx
InterlockedPopEntrySList
IsProcessorFeaturePresent
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
Sleep
GetThreadIOPendingFlag
RtlCaptureStackBackTrace
ResetEvent
IsDebuggerPresent
WaitForSingleObject
WaitForMultipleObjects
MulDiv
CreateMemoryResourceNotification
IsSystemResumeAutomatic
GetSystemPowerStatus
GetModuleHandleExW
GetStringTypeW
GetVersionExW
GlobalMemoryStatusEx
GetComputerNameW
GetDiskFreeSpaceExW
GetSystemDirectoryW
GetLogicalProcessorInformation
GetNativeSystemInfo
FormatMessageW
CreateMutexA
CreateEventA
OpenEventA
OpenMutexA
CreateSemaphoreA
OpenSemaphoreA
CreateEventExW
OpenFileMappingA
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
GetProcessHeap
LocalAlloc
OutputDebugStringW
GetShortPathNameA
ExpandEnvironmentStringsW
CreateDirectoryW
VirtualAlloc
VirtualFree
SignalObjectAndWait
SetWaitableTimerEx
CancelWaitableTimer
CreateWaitableTimerW
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
GetTempPathW
TerminateProcess
GetShortPathNameW
ReadFile
WriteFile
CreateFileW
GetFileSizeEx
LockResource
SetFileAttributesW
RemoveDirectoryW
GetDriveTypeW
SetEndOfFile
SetFilePointerEx
GetOverlappedResult
DeviceIoControl
FlushFileBuffers
CancelIoEx
GetFileType
CopyFileW
GetTempFileNameW
SetFileInformationByHandle
GetLocaleInfoEx
LocaleNameToLCID
LCIDToLocaleName
IsValidLocale
GetSystemDefaultLCID
GetUserDefaultLCID
GetSystemDefaultLocaleName
EnumSystemLocalesEx
SwitchToThread
SystemTimeToTzSpecificLocalTime
GetProductInfo
LocalFree
GetCPInfoExW
GetStringTypeExW
FileTimeToSystemTime
GetTempPathA
DeleteFileA
GetModuleFileNameA
CreateProcessW
GetLocalTime
lstrcmpW
FindFirstFileW
GetCurrentDirectoryW
GetFullPathNameW
SetEvent
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceFrequency
CloseHandle
GetCurrentThreadId
AcquireSRWLockShared
AcquireSRWLockExclusive
ReleaseSRWLockShared
ReleaseSRWLockExclusive
MultiByteToWideChar
GetModuleFileNameW
CompareStringEx
LoadLibraryExA
LoadLibraryA
OpenThread
K32GetProcessImageFileNameW
AllocConsole
AttachConsole
FreeConsole
GetUserGeoID
VerifyVersionInfoW
GetUserDefaultLocaleName
IsValidCodePage
WideCharToMultiByte
SetLastError
GetFileInformationByHandleEx
WaitForSingleObjectEx
GetTickCount64
GetFileAttributesExW
QueryPerformanceCounter
QueryUnbiasedInterruptTime
SystemTimeToFileTime
InitializeSRWLock
GetSystemTimeAsFileTime
GetCurrentProcessId
FindNextFileW
FindFirstFileExW
FindClose
GetLongPathNameW
DeleteFileW
VerSetConditionMask
K32EnumProcesses
GetPriorityClass
GetExitCodeProcess
ProcessIdToSessionId
ReadConsoleW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
GetOEMCP
GetACP
UnregisterWaitEx
InterlockedFlushSList
FreeLibraryAndExitThread
IsWow64Process
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
FlsFree
FlsAlloc
GetLastError
CreateFileMappingA
GetExitCodeThread
EncodePointer
DecodePointer
GetCommandLineW
RaiseException
RtlUnwind
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CreateSemaphoreW
GetCPInfo
CreateTimerQueue
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
RegisterWaitForSingleObject
UnregisterWait
CompareStringW
LCMapStringW
GetLocaleInfoW
EnumSystemLocalesW
ExitProcess
GetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
VirtualProtect
GetThreadTimes
CoCreateInstance
CoTaskMemFree
StringFromIID
CoRevokeInitializeSpy
CoRegisterInitializeSpy
CreateStreamOnHGlobal
CoCreateGuid
CLSIDFromString
StringFromGUID2
IIDFromString
CoInitializeEx
CoUninitialize
CoTaskMemAlloc
SysAllocString
VariantInit
VariantClear
SysFreeString
FreeAddrInfoW
GetAddrInfoW
WSAStartup
Rectangle
CreatePen
CreateFontW
SetTextColor
SetBkColor
GetStockObject
SelectObject
DeleteObject
GetDeviceCaps
SetDCPenColor
GetTextMetricsW
GetTextExtentPoint32W
CreateSolidBrush
SetDCBrushColor
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectRectI
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromScan0
GdipFillRectangleI
GdipDrawImageRectI
WinVerifyTrust
FreeMibTable
CreateSortedAddressPairs
ord13
ord10
ord14
SetupIterateCabinetW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ