Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.022384021fc61a32979b8af7186ee910.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.022384021fc61a32979b8af7186ee910.exe
Resource
win10v2004-20231020-en
Target
NEAS.022384021fc61a32979b8af7186ee910.exe
Size
1.1MB
MD5
022384021fc61a32979b8af7186ee910
SHA1
8c6da7fe594e8aea9736dd46b15dec4700d819ee
SHA256
cdb32a26cbe80ff33a136293e8a0cda6caefe033ef5036ceaba2c09ee120bd11
SHA512
fc369e14dcd2ed8eb93482fcd04f4d295f45c084c4cceffdb37a8e264cb284837f62ce8af00313bb072831d427f2b2ff3b4026d17f0a74c20c7cf11c31ee3675
SSDEEP
24576:oigAbRynLAgvMbKEUhHctOzORj1qJ7wxhAuSe9:gAbOxvMZJDqJ8xhA/e9
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
CloseHandle
ConnectNamedPipe
lstrcmpW
CreateMutexW
CreateEventW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
GetCommandLineW
SetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
GetComputerNameW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
CreateSemaphoreW
GetTickCount
GetStartupInfoW
SetEndOfFile
WriteFile
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetErrorMode
GetOverlappedResult
GetLastError
RaiseException
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
GetProcAddress
FreeLibrary
InterlockedDecrement
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetTimeZoneInformation
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
SetProcessAffinityMask
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
DeleteTimerQueueTimer
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
HeapDestroy
WaitForMultipleObjectsEx
LockResource
SetConsoleCtrlHandler
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
lstrlenA
lstrlenW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
FatalAppExitA
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
ExitThread
GetClassNameW
GetWindowThreadProcessId
SendMessageTimeoutW
UnregisterClassW
EnumWindows
EnumChildWindows
CharLowerBuffW
RegisterWindowMessageW
CryptReleaseContext
GetTokenInformation
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
OpenProcessToken
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
IsValidSid
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CLSIDFromString
CoCreateInstance
CoUninitialize
VarBstrCmp
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathMakePrettyW
PathAppendW
PathCombineA
PathCombineW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveArgsW
PathRemoveExtensionW
PathStripPathW
PathUnquoteSpacesW
CryptStringToBinaryA
CryptBinaryToStringA
WinHttpReadData
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetModuleFileNameExW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ