Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
MGL.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
MGL.exe
Resource
win10v2004-20231023-en
Target
MGL.exe
Size
10.2MB
MD5
009907018127a217d8388b4fb45f580c
SHA1
a626454f6e439b1abb8b67d698b9565743f56374
SHA256
7288934622af10995104ecaa369bd6f479bbe9f6b65f0e19d734f877e3ce3616
SHA512
3ceda7b3ccc975e632d0c6155cd9a4decee3acbd29574e6ea63a23234e2550de0f21cef2d4e9f87a6c9529dc9a740bb0c33866abbf7cdb08228019e653c84ff9
SSDEEP
196608:zym1uHGDLZ90fa+8E8hIlCv1lYELSciSbH2O:zyKuuLZ90C+8EMqCwEeBM
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Direct3DCreate9
PathCreateFromUrlW
PathCombineW
UrlCreateFromPathW
InternetCloseHandle
InternetCrackUrlW
HttpOpenRequestW
HttpSendRequestW
InternetConnectW
InternetOpenA
InternetSetOptionW
HttpQueryInfoW
GetSaveFileNameW
GetOpenFileNameW
AuthzAccessCheck
AuthzFreeResourceManager
AuthzInitializeResourceManager
AuthzFreeContext
AuthzInitializeContextFromSid
AlphaBlend
DragFinish
SHGetFolderPathW
SHGetFileInfoW
SHChangeNotify
DragQueryFileW
Shell_NotifyIconW
DragAcceptFiles
SHCreateStdEnumFmtEtc
SHAppBarMessage
ShellExecuteW
ShellExecuteExW
select
setsockopt
WSAAddressToStringW
WSACleanup
gethostbyname
bind
closesocket
WSAGetLastError
connect
inet_addr
getnameinfo
send
WSCEnumProtocols
htons
htonl
accept
freeaddrinfo
WSAStartup
__WSAFDIsSet
WSCGetProviderPath
getsockname
listen
getaddrinfo
recv
socket
inet_ntoa
ioctlsocket
shutdown
GetModuleInformation
GetProcessImageFileNameW
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
MoveWindow
CreateWindowExW
PeekMessageW
MonitorFromWindow
MessageBoxA
SetTimer
AllowSetForegroundWindow
WindowFromPoint
BeginPaint
FrameRect
RegisterWindowMessageW
FillRect
DispatchMessageW
EnumWindows
GetClassInfoW
SetActiveWindow
GetActiveWindow
GetKeyboardLayoutList
EnumChildWindows
ReleaseCapture
LoadCursorW
SetCapture
GetCapture
GetCursorInfo
CharLowerBuffW
GetSystemMetrics
PostMessageW
SetWindowLongW
CharUpperBuffW
GetClientRect
ShowCursor
SetClipboardData
GetClipboardData
ClientToScreen
IsIconic
GetMonitorInfoW
ShowWindow
CharUpperW
DefWindowProcW
SetForegroundWindow
GetForegroundWindow
GetAsyncKeyState
MapVirtualKeyExW
EnableWindow
GetShellWindow
DestroyWindow
RegisterClassW
CharNextW
GetWindowThreadProcessId
RedrawWindow
GetFocus
GetDC
SetFocus
ReleaseDC
EndPaint
TrackMouseEvent
GetParent
MessageBeep
MessageBoxW
SetClassLongW
RegisterHotKey
UpdateWindow
AttachThreadInput
MsgWaitForMultipleObjects
DestroyIcon
IsWindowVisible
EmptyClipboard
FlashWindowEx
PtInRect
UnregisterClassW
SendMessageW
GetLastInputInfo
IsWindow
EnumThreadWindows
InvalidateRect
ScreenToClient
GetWindowInfo
SendMessageTimeoutW
BringWindowToTop
SetCursor
LoadStringW
SetWindowPos
OpenClipboard
TranslateMessage
EnumDisplayMonitors
CallWindowProcW
CloseClipboard
UpdateLayeredWindow
DrawIconEx
GetClassNameW
LoadImageW
GetIconInfo
GetKeyNameTextW
GetDesktopWindow
GetCursorPos
DeferWindowPos
EndDeferWindowPos
UnregisterHotKey
GetKeyState
MonitorFromPoint
SystemParametersInfoW
CreateIconFromResourceEx
GetWindow
GetWindowLongW
GetWindowRect
KillTimer
BeginDeferWindowPos
PostThreadMessageW
IsWindowEnabled
CreateIconIndirect
FindWindowW
GetKeyboardLayout
SafeArrayPutElement
SysFreeString
VariantClear
VariantInit
SysReAllocStringLen
SysAllocString
SafeArrayCreate
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayCreateVector
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
ConvertStringSecurityDescriptorToSecurityDescriptorA
CloseServiceHandle
RegSetValueExW
AddAccessDeniedObjectAce
AddAccessAllowedObjectAce
AddAuditAccessAceEx
AddAce
OpenThreadToken
CloseEventLog
RegQueryInfoKeyW
IsValidSid
CreateWellKnownSid
GetLengthSid
AddAccessAllowedAceEx
OpenEventLogW
GetTokenInformation
ReadEventLogW
RegCreateKeyExW
SetSecurityDescriptorDacl
OpenServiceW
InitializeAcl
RegEnumKeyExW
AdjustTokenPrivileges
QueryServiceConfigW
CopySid
SetSecurityInfo
AddAuditAccessObjectAce
RegDeleteKeyW
LookupPrivilegeValueW
OpenSCManagerW
RegOpenKeyExW
OpenProcessToken
RegDeleteValueW
RegNotifyChangeKeyValue
AddAccessDeniedAceEx
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegFlushKey
RegEnumValueW
RegQueryValueExW
ConvertSidToStringSidW
RegCloseKey
InitializeSecurityDescriptor
EnumServicesStatusW
ReadFileEx
SetFileTime
GetFileTime
Process32FirstW
GetACP
GetExitCodeProcess
CloseHandle
LocalFree
SizeofResource
GetCurrentProcessId
TerminateThread
SetHandleInformation
GetHandleInformation
GetFullPathNameW
FindNextFileW
WriteProcessMemory
CreateHardLinkW
SetUnhandledExceptionFilter
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
FreeLibrary
SetDllDirectoryW
GetUserDefaultLCID
SetLastError
GetModuleFileNameW
GetLastError
GlobalAlloc
GlobalUnlock
OpenMutexW
CreateThread
CompareStringW
GetGeoInfoW
LoadLibraryA
CreateMutexW
ResetEvent
GetVolumeInformationW
RaiseException
FormatMessageW
OpenJobObjectW
GetCurrentThread
GetLogicalDrives
HeapReAlloc
IsBadReadPtr
ExpandEnvironmentStringsW
LoadLibraryExW
MoveFileWithProgressW
FileTimeToSystemTime
VirtualQuery
VirtualQueryEx
Sleep
SetFilePointer
FlushFileBuffers
LoadResource
SuspendThread
GetTickCount
WritePrivateProfileStringW
GetFileSize
GetStartupInfoW
GetFileAttributesW
SetThreadPriority
VirtualAlloc
GetSystemInfo
GetTempPathW
LeaveCriticalSection
GetLogicalDriveStringsW
GetModuleHandleA
HeapCreate
VerSetConditionMask
GetDiskFreeSpaceW
GetUserDefaultUILanguage
WriteFileEx
GetModuleFileNameA
CompareStringA
WaitForSingleObjectEx
GetCompressedFileSizeW
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryW
SetEvent
FreeEnvironmentStringsW
GetLocaleInfoW
ConnectNamedPipe
GetLocalTime
WaitForSingleObject
GetSystemPowerStatus
OpenThread
DeleteCriticalSection
HeapLock
SetErrorMode
GetLogicalProcessorInformation
TzSpecificLocalTimeToSystemTime
SleepEx
IsValidLocale
LocalAlloc
WaitForMultipleObjectsEx
GetVolumePathNameW
SetFileAttributesW
QueryDosDeviceW
VirtualProtect
SetEnvironmentVariableW
ReadProcessMemory
QueryPerformanceFrequency
SetThreadContext
VirtualFree
GetThreadContext
FlushInstructionCache
ExitProcess
HeapAlloc
GetLongPathNameW
RtlUnwind
GetCPInfo
GetStdHandle
DisconnectNamedPipe
GetModuleHandleW
SetInformationJobObject
ReadFile
CompareFileTime
CreateProcessW
CreateRemoteThread
GetNativeSystemInfo
FindResourceW
GetUserGeoID
CheckRemoteDebuggerPresent
MapViewOfFile
MulDiv
CreateFileA
GetVersion
GetDriveTypeW
FreeResource
Module32NextW
SetThreadExecutionState
MoveFileW
GlobalAddAtomW
GetSystemTimeAsFileTime
OpenProcess
SwitchToThread
GetExitCodeThread
GetEnvironmentVariableA
OutputDebugStringW
GetFileAttributesExW
GlobalMemoryStatusEx
SetNamedPipeHandleState
IsProcessorFeaturePresent
LockResource
TerminateProcess
QueryInformationJobObject
GetCurrentThreadId
MoveFileExW
UnhandledExceptionFilter
PeekNamedPipe
GlobalFree
HeapWalk
EnterCriticalSection
GetDiskFreeSpaceExW
ReleaseMutex
EnumResourceLanguagesW
GlobalDeleteAtom
SetCurrentDirectoryW
GetCurrentDirectoryW
InitializeCriticalSection
GlobalLock
GetCurrentProcess
GetCommandLineW
HeapSetInformation
ResumeThread
GetProcAddress
VirtualAllocEx
BaseFlushAppcompatCache
FindResourceExW
GetVersionExW
VerifyVersionInfoW
GetEnvironmentStringsW
LCMapStringW
DeviceIoControl
FindFirstFileW
UnmapViewOfFile
Process32NextW
lstrlenW
GetVolumeNameForVolumeMountPointW
SetEndOfFile
QueryPerformanceCounter
CreateToolhelp32Snapshot
SystemTimeToFileTime
CreateFileW
EnumResourceNamesW
GetSystemDirectoryW
DeleteFileW
GetEnvironmentVariableW
Module32FirstW
WriteFile
GetFileInformationByHandle
FindFirstFileExW
ExitThread
CreateNamedPipeW
CreateFileMappingW
CreatePipe
TlsGetValue
HeapUnlock
GetDateFormatW
TlsSetValue
GetSystemDefaultUILanguage
GetOverlappedResult
CreateDirectoryW
EnumCalendarInfoW
IsWow64Process
GetProcessId
RemoveDirectoryW
CreateEventW
SetThreadLocale
GetThreadLocale
SHGetFolderPathA
DnsQuery_W
DnsRecordListFree
CoCreateGuid
CoCreateInstance
CoUninitialize
OleInitialize
CoSetProxyBlanket
PropVariantClear
OleUninitialize
CoInitializeEx
CoInitialize
CoInitializeSecurity
CoTaskMemFree
CoTaskMemAlloc
DoDragDrop
GetAdaptersAddresses
IcmpCloseHandle
IcmpSendEcho
IcmpCreateFile
GetBestInterface
GetBitmapBits
SetBkMode
GetObjectW
CreateCompatibleBitmap
CreateDIBSection
SetMapMode
GetStockObject
CreateSolidBrush
SelectObject
DeleteObject
DeleteDC
BitBlt
GetDeviceCaps
CreateCompatibleDC
NtQueryInformationProcess
NtQueryInformationThread
NoGCLayPipe
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ