Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
b27e4530cd045fe96a97f0ccca77a5434d49ed5f4c64d9de4b8f29c106170dd6.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
b27e4530cd045fe96a97f0ccca77a5434d49ed5f4c64d9de4b8f29c106170dd6.exe
Resource
win10-20231020-en
Target
12914036334.zip
Size
7.7MB
MD5
a837f71a58d657ff319c2bca909dbd92
SHA1
2146759b11cc5b13a512126f1dd44860b736a7d8
SHA256
bd42cc5f4522bc0478d685ae96a748d3a4588ec9fe8ce9fbde449ce6655b7e4c
SHA512
58244034d0dd7c86395f94df6218caf7a876dc375a6fdaf09fbdbc6855554f12e3851a47da92634afc46a6abe394f64dd32ad4a40c73164de29c89f9f17c8dd8
SSDEEP
196608:we6QjsJKl2rsitr4WulUP+PMJaz65ql0n6lT:we6Y2rs5D8+PrmMl0n2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SetFileAttributesW
GetFileType
GetACP
GetExitCodeProcess
CloseHandle
LocalFree
SizeofResource
VirtualProtect
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FlushInstructionCache
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
DisconnectNamedPipe
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
SetDllDirectoryW
HeapDestroy
ReadFile
CreateProcessW
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
lstrcmpA
LoadLibraryA
ResetEvent
FreeResource
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
FlushFileBuffers
LoadResource
SuspendThread
GetTickCount
WaitForMultipleObjects
GetFileSize
GetStartupInfoW
GetFileAttributesW
SetCurrentDirectoryW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
GetModuleHandleA
HeapCreate
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
GetConsoleCP
GetModuleFileNameA
lstrlenW
SetEndOfFile
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
SetEvent
GetLocaleInfoW
CreateFileW
DeleteFileW
IsDBCSLeadByteEx
ConnectNamedPipe
GetLocalTime
WaitForSingleObject
WriteFile
CreateNamedPipeW
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
SetConsoleCtrlHandler
CreateEventW
SetThreadLocale
GetThreadLocale
InterlockedPopEntrySList
QueryDepthSList
InterlockedFlushSList
InitializeSListHead
InterlockedPushEntrySList
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
UnregisterClassW
CreateWindowExW
GetClassInfoW
WaitForInputIdle
TranslateMessage
CharLowerBuffW
CharUpperW
PeekMessageW
GetSystemMetrics
DefWindowProcW
SetWindowLongW
GetWindowLongW
PostMessageW
MessageBoxW
MessageBoxA
DestroyWindow
CharUpperBuffW
SendMessageTimeoutW
RegisterClassW
CharNextW
MsgWaitForMultipleObjects
LoadStringW
DispatchMessageW
SafeArrayPutElement
VariantInit
VariantClear
SysFreeString
SafeArrayAccessData
SysReAllocStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
NetWkstaGetInfo
NetApiBufferFree
RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegEnumValueW
RegQueryValueExW
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExW
SetSecurityDescriptorDacl
RegRestoreKeyW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ