Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
fe5872ae9dfa52dbfcdbb3f69e01369c9ffa67cf8242941749ed958afb1bd78b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
fe5872ae9dfa52dbfcdbb3f69e01369c9ffa67cf8242941749ed958afb1bd78b.exe
Resource
win10v2004-20231020-en
Target
fe5872ae9dfa52dbfcdbb3f69e01369c9ffa67cf8242941749ed958afb1bd78b
Size
699KB
MD5
9bb683d1cbac0be53a7dc462f6eb4024
SHA1
5d1920ed1791695100c90b5543abf1ada408f82f
SHA256
fe5872ae9dfa52dbfcdbb3f69e01369c9ffa67cf8242941749ed958afb1bd78b
SHA512
4eb2c5d7c59671d79532c059db6626da067f272669ddd915757a222b479ecc58f84c91b32b1b2f032ec5bd4d3b00e6879369ce844c8898ad86e3d4b8f65acc22
SSDEEP
12288:qIr6/HwiuXl+rmHxQPph0lhSMXle+eO1HK+meynh5yRX3oRG72:56/HwzwrsyBh0lhSMXlemqth5yRX30GS
metasploit
windows/reverse_tcp
47.115.206.23:3333
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
NetServerEnum
NetApiBufferFree
gethostname
WSAStartup
inet_ntoa
gethostbyname
WNetCancelConnection2W
WNetAddConnection2W
SetFileAttributesW
DuplicateHandle
DisconnectNamedPipe
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
CreateEventW
WaitForMultipleObjects
GetCurrentProcessId
GetFileTime
GetExitCodeProcess
ResumeThread
GetVersion
SetProcessAffinityMask
CopyFileW
ReadConsoleW
SetConsoleCtrlHandler
SetConsoleTitleW
HeapReAlloc
GetEnvironmentVariableW
GetFileAttributesW
ReadFile
GetConsoleScreenBufferInfo
MultiByteToWideChar
VerifyVersionInfoW
FormatMessageA
FindResourceW
SizeofResource
LockResource
LoadResource
FreeLibrary
GetSystemDirectoryW
GetTickCount
GetCurrentProcess
Sleep
WaitForSingleObject
SetEvent
CloseHandle
WriteFile
DeleteFileW
CreateFileW
VerSetConditionMask
SetThreadGroupAffinity
SetPriorityClass
GetModuleFileNameW
LocalFree
SetEndOfFile
LocalAlloc
GetProcAddress
GetModuleHandleW
GetFileType
GetCommandLineW
GetStdHandle
LoadLibraryExW
GetVersionExW
SetLastError
GetComputerNameW
GetLastError
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
HeapSize
TerminateProcess
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetConsoleCP
SetStdHandle
CreateThread
ExitThread
FreeLibraryAndExitThread
GetCommandLineA
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetConsoleMode
ReadConsoleInputW
GetFileSizeEx
SetFilePointerEx
PrintDlgW
CreateProcessAsUserW
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
OpenProcessToken
LsaEnumerateAccountRights
LsaOpenPolicy
LsaClose
LsaFreeMemory
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
LookupPrivilegeValueW
SetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetLengthSid
GetAce
FreeSid
AllocateAndInitializeSid
AddAce
AddAccessAllowedAce
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ