Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Anti-Malware VS Gruel.zip
Resource
win10v2004-20231020-en
Target
Microsoft Anti-Malware VS Gruel.zip
Size
132.6MB
MD5
ee061bfee744367b43e4d739a4730493
SHA1
a5bc31051bfdeb423b72dbde3a4855cd706b3e81
SHA256
25d5e7f4ba8303be71f9cbc689dbc2649388605be2c68d49603e7b88f902fadf
SHA512
5780376933b5fa4c9177873ec799d9ea68db4e4817f99acfa9951efea31fd1639ef353733334e66989781979bc5849559ece65caeaad4dc831500f93f2acc254
SSDEEP
3145728:NKJd2hmy2EOaIOBvTOhCYe4/VyGlGTajVgtS7GyrFre2b:NKJdMhvDIOxPYFY+GTajStWGareC
Checks for missing Authenticode signature.
resource |
---|
unpack001/Email-Worm.Win32.Gruel.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord690
MethCallEngine
ord516
ord662
ord593
ord594
ord595
ord520
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
ord670
EVENT_SINK_Release
ord600
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord607
ord608
ord716
ord534
ProcCallEngine
ord536
ord537
ord570
ord648
ord576
ord685
ord100
ord689
ord610
ord616
ord617
ord619
ord580
ord581
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
__initenv
exit
_cexit
_exit
_c_exit
_XcptFilter
__C_specific_handler
strncpy
strstr
_strlwr
strrchr
__getmainargs
_strnicmp
_wcsicmp
towlower
strchr
memset
tolower
memcpy
_snprintf
sprintf
free
malloc
_initterm
__setusermatherr
_commode
_fmode
__set_app_type
_stricmp
_vsnprintf
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
GetLengthSid
InitiateSystemShutdownA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
CreateThread
GetFileSize
CreateProcessA
GetExitCodeProcess
DosDateTimeToFileTime
LocalFileTimeToFileTime
InitializeCriticalSectionAndSpinCount
SetEndOfFile
GetCurrentDirectoryA
QueryDosDeviceA
GetDiskFreeSpaceA
GetSystemTime
CreateEventA
SetFileAttributesA
CopyFileA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SystemTimeToFileTime
GetProcessHeap
FindClose
FindNextFileA
SetFileTime
Sleep
GetVersionExA
ReadFile
SetFilePointer
MoveFileExA
RemoveDirectoryA
GetLastError
CreateDirectoryA
GetTickCount
SetErrorMode
CloseHandle
DeviceIoControl
CreateFileA
GetDriveTypeA
HeapFree
FormatMessageA
LeaveCriticalSection
DeleteFileA
EnterCriticalSection
TerminateProcess
WaitForMultipleObjects
CreateEventW
SetEvent
GetModuleFileNameA
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
HeapAlloc
SetLastError
WriteFile
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
FreeLibrary
MoveFileA
ExpandEnvironmentStringsA
ExitProcess
DeleteCriticalSection
FlushFileBuffers
WaitForSingleObject
OpenEventA
GetCurrentProcess
GetFileAttributesA
GetCommandLineA
FindFirstFileA
NtOpenProcessToken
NtAdjustPrivilegesToken
NtClose
NtShutdownSystem
ShowWindow
SendMessageA
DialogBoxParamA
MessageBoxA
SetParent
EndDialog
LoadStringA
SendDlgItemMessageA
ord17
SHBrowseForFolderA
SHGetPathFromIDListA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
TraceMessage
RegCreateKeyExW
RegCloseKey
EventWriteTransfer
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
GetLengthSid
AllocateAndInitializeSid
CopySid
FreeSid
CheckTokenMembership
EventUnregister
EventRegister
RegQueryValueExW
GetModuleFileNameW
GetExitCodeProcess
CreateProcessW
FreeLibrary
GetProcAddress
QueryFullProcessImageNameW
FindResourceW
LoadResource
CloseHandle
Process32FirstW
LockResource
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
SetLastError
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetCurrentThreadId
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WriteFile
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapAlloc
SetFileAttributesW
GetFileType
GetStartupInfoW
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LoadLibraryExW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
SetStdHandle
FlushFileBuffers
WideCharToMultiByte
ReadFile
ReadConsoleW
CreateFileW
WriteConsoleW
SetEndOfFile
EncodePointer
DecodePointer
HeapSize
HeapReAlloc
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
InitializeCriticalSectionEx
GlobalMemoryStatusEx
FindNextFileW
FindClose
GetFileAttributesW
OpenProcess
CreateEventW
GetSystemDirectoryW
HeapSetInformation
VirtualLock
WaitForSingleObject
TerminateProcess
DeviceIoControl
GetVolumeInformationW
SizeofResource
GetNativeSystemInfo
GetStdHandle
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
UuidCreate
RtlGetVersion
RtlNtStatusToDosError
NtSetInformationFile
RtlUnwind
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
CertVerifyCertificateChainPolicy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
TraceMessage
RegCreateKeyExW
RegCloseKey
EventWriteTransfer
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
AllocateAndInitializeSid
CopySid
FreeSid
CheckTokenMembership
GetLengthSid
EventUnregister
EventRegister
RegQueryValueExW
GetModuleFileNameW
GetExitCodeProcess
CreateProcessW
FreeLibrary
GetProcAddress
QueryFullProcessImageNameW
FindResourceW
LoadResource
CloseHandle
Process32FirstW
LockResource
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
SetLastError
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetCurrentThreadId
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFileAttributesW
SetFilePointerEx
HeapAlloc
GetStdHandle
GetFileType
GetStartupInfoW
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LoadLibraryExW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
SetStdHandle
FlushFileBuffers
WideCharToMultiByte
ReadFile
ReadConsoleW
CreateFileW
WriteConsoleW
SetEndOfFile
HeapSize
HeapReAlloc
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
EncodePointer
InitializeCriticalSectionEx
GlobalMemoryStatusEx
FindNextFileW
FindClose
GetFileAttributesW
OpenProcess
CreateEventW
GetSystemDirectoryW
HeapSetInformation
VirtualLock
WaitForSingleObject
TerminateProcess
DeviceIoControl
GetVolumeInformationW
SizeofResource
GetNativeSystemInfo
GetFileSizeEx
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
DecodePointer
UuidCreate
RtlGetVersion
NtSetInformationFile
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlNtStatusToDosError
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
CertVerifyCertificateChainPolicy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ