Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
82508efc19b7c7ec5e98f195f56ce723fc3f08f477fb739aab6356ac4190ea82.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
82508efc19b7c7ec5e98f195f56ce723fc3f08f477fb739aab6356ac4190ea82.exe
Resource
win10v2004-20231023-en
Target
82508efc19b7c7ec5e98f195f56ce723fc3f08f477fb739aab6356ac4190ea82
Size
699KB
MD5
d0a7369c3484c14af76e3e3485337f45
SHA1
c21a0bcd320bd30eba1dcc224d6391207c7e3a5d
SHA256
82508efc19b7c7ec5e98f195f56ce723fc3f08f477fb739aab6356ac4190ea82
SHA512
fb1b34d82717a969d6864f1c62b96f35ccae7dfd9f2dc6bbf2d44a4fc2a35dab823db2c2dbb62abfebd4a66730794d6b033ef3a7d3fa2efbc755c0fa8712d015
SSDEEP
12288:bz0DMfu/Oh9ef3hhT2XlJ4gPph0lhSMXle+eO1HK+meynh5yRX3oRG72:P0DsTc3hhT2XLBBh0lhSMXlemqth5yRk
metasploit
encoder/shikata_ga_nai
metasploit
windows/reverse_tcp
47.115.206.23:3333
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
NetServerEnum
NetApiBufferFree
gethostname
WSAStartup
inet_ntoa
gethostbyname
WNetCancelConnection2W
WNetAddConnection2W
SetFileAttributesW
DuplicateHandle
DisconnectNamedPipe
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
CreateEventW
WaitForMultipleObjects
GetCurrentProcessId
GetFileTime
GetExitCodeProcess
ResumeThread
GetVersion
SetProcessAffinityMask
CopyFileW
ReadConsoleW
SetConsoleCtrlHandler
SetConsoleTitleW
HeapReAlloc
GetEnvironmentVariableW
GetFileAttributesW
ReadFile
GetConsoleScreenBufferInfo
MultiByteToWideChar
VerifyVersionInfoW
FormatMessageA
FindResourceW
SizeofResource
LockResource
LoadResource
FreeLibrary
GetSystemDirectoryW
GetTickCount
GetCurrentProcess
Sleep
WaitForSingleObject
SetEvent
CloseHandle
WriteFile
DeleteFileW
CreateFileW
VerSetConditionMask
SetThreadGroupAffinity
SetPriorityClass
GetModuleFileNameW
LocalFree
SetEndOfFile
LocalAlloc
GetProcAddress
GetModuleHandleW
GetFileType
GetCommandLineW
GetStdHandle
LoadLibraryExW
GetVersionExW
SetLastError
GetComputerNameW
GetLastError
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
HeapSize
TerminateProcess
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetConsoleCP
SetStdHandle
CreateThread
ExitThread
FreeLibraryAndExitThread
GetCommandLineA
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetConsoleMode
ReadConsoleInputW
GetFileSizeEx
SetFilePointerEx
PrintDlgW
CreateProcessAsUserW
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
OpenProcessToken
LsaEnumerateAccountRights
LsaOpenPolicy
LsaClose
LsaFreeMemory
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
LookupPrivilegeValueW
SetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetLengthSid
GetAce
FreeSid
AllocateAndInitializeSid
AddAce
AddAccessAllowedAce
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ