Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
Order_Summary.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Order_Summary.exe
Resource
win10v2004-20231023-en
Target
Order_Summary.exe
Size
485KB
MD5
6bf3b86782b7911b76029737162ae206
SHA1
1b8009865c79b5674734ba4ce9a6905bed78182e
SHA256
535f67c47f811aa5b421904959dd6931396a52cdbb9ddb69bface741356dbbef
SHA512
385291ef2ba36b39fd6c7c5af08ad9127d60685e28d69e55152341f522b79f2f4ca3c1aa9e13575dbce0699d976b34dbb5985d08495ca22dc20ed323b7d80ba1
SSDEEP
6144:+d9GVCixOlHU+A/d6tUHOApJBIojiXEL6NSzpYJ8cLmBTXR/TXRqY+xBBYZK:+rFlGIUdbBWEL6GpYJpqy3p
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetPrivateProfileStringW
GetTimeZoneInformation
GetPrivateProfileSectionW
GetPrivateProfileIntW
GetTempPathW
GetTempFileNameW
CopyFileW
DeleteFileW
WriteFile
InterlockedIncrement
GetModuleHandleW
GetProcAddress
SetLastError
GetVersionExW
GetSystemDirectoryW
GetVersion
ProcessIdToSessionId
DebugBreak
VirtualProtect
IsBadCodePtr
IsBadReadPtr
GetModuleHandleExW
ExitThread
CreateDirectoryW
GetCommandLineW
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
UnmapViewOfFile
MapViewOfFile
FlushInstructionCache
VirtualFree
Sleep
CreateFileMappingA
lstrlenW
GetWindowsDirectoryW
LocalFree
LocalAlloc
InterlockedExchange
InterlockedCompareExchange
WritePrivateProfileStringW
SystemTimeToFileTime
GetFileSizeEx
CreateProcessW
WTSGetActiveConsoleSessionId
WaitForSingleObject
ReadProcessMemory
VirtualQueryEx
InitializeCriticalSectionAndSpinCount
lstrlenA
CreateFileMappingW
HeapCreate
CreateEventW
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RemoveVectoredExceptionHandler
GetCurrentThreadId
TerminateProcess
VirtualQuery
GetModuleFileNameA
ReleaseMutex
LoadLibraryW
lstrcatA
GetThreadContext
Process32NextW
DuplicateHandle
VirtualAlloc
OpenFileMappingW
OpenEventW
lstrcpyA
VirtualAllocEx
VirtualFreeEx
GetCurrentThread
VirtualProtectEx
WriteProcessMemory
CreateRemoteThread
IsBadWritePtr
GetExitCodeThread
lstrcpyW
SetEndOfFile
SetFilePointer
GetPrivateProfileSectionNamesW
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
LoadResource
GetStringTypeA
GetConsoleMode
Process32FirstW
CreateToolhelp32Snapshot
FindNextFileW
FindFirstFileW
GetCurrentProcess
GetTickCount
OpenProcess
FindClose
VerifyVersionInfoW
VerSetConditionMask
ReadFile
DeviceIoControl
CreateFileA
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalAlloc
GetLocalTime
GetCurrentProcessId
GetModuleFileNameW
CreateMutexW
GetLastError
GetProcessHeap
HeapFree
HeapAlloc
GetFileSize
CreateFileW
CloseHandle
FindResourceExW
FindResourceW
SizeofResource
GetConsoleCP
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
LCMapStringW
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
GetCPInfo
RtlUnwind
GetStartupInfoW
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
HeapSize
HeapReAlloc
HeapDestroy
RaiseException
LockResource
OpenMutexW
GetLastInputInfo
PostQuitMessage
SetTimer
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
UpdateWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
ShowWindow
TranslateMessage
GetUserObjectInformationA
DispatchMessageW
GetMessageW
KillTimer
OpenInputDesktop
CloseDesktop
GetThreadDesktop
RegOpenCurrentUser
SetSecurityDescriptorDacl
GetLengthSid
GetKernelObjectSecurity
AllocateAndInitializeSid
FreeSid
RegEnumKeyExW
CreateProcessAsUserW
DuplicateTokenEx
SetTokenInformation
GetTokenInformation
GetUserNameW
RegQueryValueExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
ImpersonateLoggedOnUser
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
InitializeSecurityDescriptor
SHFileOperationW
SHGetSpecialFolderPathW
SHGetFolderPathW
ord165
CoCreateGuid
CloseLog
CreateLog
WriteLog
PathAppendW
PathRemoveFileSpecW
StrCpyW
PathFileExistsW
PathIsDirectoryW
PathAddBackslashW
SHGetValueW
SHSetValueW
SHDeleteValueW
PathIsDirectoryEmptyW
PathFindExtensionW
PathFindFileNameW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WTSFreeMemory
WTSEnumerateSessionsW
WTSQueryUserToken
GetAdaptersAddresses
RpcStringFreeW
UuidToStringW
UuidCreate
WinHttpOpenRequest
WinHttpConnect
WinHttpSendRequest
WinHttpWriteData
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpCloseHandle
WinHttpSetOption
WinHttpReceiveResponse
WinHttpSetCredentials
WinHttpReadData
WinHttpQueryHeaders
GetModuleInformation
GetModuleFileNameExW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ