Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ea183c51573f5c4e9d3907532e73fd10.exe
Resource
win7-20231020-en
Target
NEAS.ea183c51573f5c4e9d3907532e73fd10.exe
Size
2.2MB
MD5
ea183c51573f5c4e9d3907532e73fd10
SHA1
0287728907468d417b32d89824fb818b006e2193
SHA256
b2b05c1e6142d003d957bb61c74d8538043fa12d132fe79c9badbd371da758d5
SHA512
289d115a35a148bdbf27e458f73654266103e126ecc72789f22ad4f4ea371a9f9d6f4c594eba94252a0e1a84ba720aff50e9a01ba17d6b672e3dc24edaab9f0d
SSDEEP
24576:iIwpWf1hyq9P3+GY9cJUf7LX/MNmO0tZEqYh4grMgkRNyrna6gfqFAzTI9CpTzsA:32T6Y7LvM4y7ovT5GhdHu
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameExA
EnumProcesses
ExpandEnvironmentStringsForUserA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
InternetCrackUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
DeleteUrlCacheEntry
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
InternetReadFileExA
LoadLibraryW
FormatMessageW
GetFileAttributesW
CreateFileW
FlushFileBuffers
GetTempPathW
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
GetDiskFreeSpaceA
GetFileAttributesExW
DeleteFileW
AreFileApisANSI
WaitForMultipleObjects
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
FreeResource
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
InterlockedExchange
GetLocaleInfoA
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SetEvent
SuspendThread
CreateEventA
GetModuleFileNameW
InterlockedDecrement
RaiseException
GetThreadLocale
GetSystemTimeAsFileTime
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
DuplicateHandle
GetVolumeInformationA
SetErrorMode
GetFileSizeEx
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
HeapReAlloc
RtlUnwind
VirtualProtect
VirtualAlloc
VirtualQuery
ExitThread
CreateThread
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
UnlockFileEx
LockFile
UnlockFile
InterlockedCompareExchange
QueryPerformanceCounter
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
GetFullPathNameW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GlobalMemoryStatus
SetFilePointer
WriteFile
ReadFile
GetFileSize
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemInfo
GetVersionExA
ResumeThread
Sleep
GetCurrentProcess
FileTimeToLocalFileTime
GetFileTime
CreateFileA
GetTimeZoneInformation
FileTimeToSystemTime
GetCurrentProcessId
GetProcAddress
Module32Next
Module32First
GetExitCodeProcess
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
CreateProcessA
CloseHandle
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetCurrentThreadId
GetLongPathNameA
MultiByteToWideChar
GetFullPathNameA
GetCurrentDirectoryA
GetModuleFileNameA
MoveFileA
GetFileAttributesA
SetFileAttributesA
RemoveDirectoryA
DeleteFileA
GetTempFileNameA
GetSystemTime
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
LocalFree
lstrlenA
LocalAlloc
GetModuleHandleA
FormatMessageA
GetUserDefaultUILanguage
FindResourceExA
LoadLibraryExA
FreeLibrary
EnumResourceLanguagesA
EnumResourceNamesA
LoadLibraryA
EndUpdateResourceA
HeapFree
UpdateResourceA
GetProcessHeap
HeapAlloc
BeginUpdateResourceA
WritePrivateProfileStringA
CreateMutexA
ReleaseMutex
GetTempPathA
GetPrivateProfileStringA
GetPrivateProfileIntA
CopyFileA
SystemTimeToFileTime
GetLocalTime
GetTickCount
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ResetEvent
GetModuleHandleW
PostThreadMessageA
LoadCursorA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
SetCursor
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
EqualRect
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
GetWindowTextLengthA
GetWindowTextA
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
GetKeyboardState
IsWindow
SendMessageA
EnableWindow
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDlgItem
SetWindowTextA
SetWindowLongA
EndDialog
GetSysColorBrush
GetSysColor
GetDlgCtrlID
GetWindowLongA
DialogBoxParamA
GetClientRect
IsIconic
SetClassLongA
AppendMenuA
CreatePopupMenu
GetCursorPos
MessageBeep
GetNextDlgGroupItem
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
CharNextA
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
UnregisterClassA
CharUpperA
UpdateWindow
MessageBoxA
MessageBoxExA
PostMessageA
LoadIconA
IsWindowVisible
SetForegroundWindow
SetTimer
KillTimer
LoadStringA
EnumWindows
IsWindowEnabled
GetWindowThreadProcessId
GetClassNameA
EnumChildWindows
GetShellWindow
GetSystemMetrics
SystemParametersInfoA
EnumDisplaySettingsA
FindWindowA
GetDesktopWindow
GetWindowRect
WaitForInputIdle
GetParent
AdjustWindowRectEx
OffsetRect
DeleteDC
GetStockObject
ExtSelectClipRgn
GetMapMode
GetRgnBox
GetBkColor
GetTextColor
ScaleWindowExtEx
SetWindowExtEx
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
CreateBitmap
CreateRectRgnIndirect
GetObjectA
SetTextColor
GetClipBox
GetDeviceCaps
SetBkColor
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetFileTitleA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
GetSidIdentifierAuthority
IsValidSid
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RevertToSelf
RegCreateKeyExA
RegCloseKey
RegOpenCurrentUser
AdjustTokenPrivileges
GetLengthSid
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
Shell_NotifyIconA
SHGetSpecialFolderPathA
ShellExecuteExA
InitCommonControlsEx
PathCombineA
PathFindExtensionA
PathStripPathA
PathRemoveFileSpecA
PathIsDirectoryEmptyA
SHDeleteKeyA
UrlEscapeA
SHDeleteEmptyKeyA
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathRenameExtensionA
PathIsUNCA
ord8
CoInitialize
StringFromGUID2
CoFreeUnusedLibraries
CoTaskMemFree
OleUninitialize
CoInitializeSecurity
OleInitialize
CLSIDFromProgID
CoTaskMemAlloc
CoUninitialize
CoInitializeEx
CLSIDFromString
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
CoCreateInstance
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoCreateGuid
CoGetClassObject
SysAllocStringByteLen
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
DispCallFunc
SysAllocString
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
SysStringLen
SafeArrayCreateVector
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
VariantClear
SysFreeString
IsValidURL
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ