Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
04e750971612ffea8ea425e4d11887f1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04e750971612ffea8ea425e4d11887f1.exe
Resource
win10v2004-20231215-en
Target
04e750971612ffea8ea425e4d11887f1
Size
560KB
MD5
04e750971612ffea8ea425e4d11887f1
SHA1
faa550e3fc2424702187ba08532fddc2d92e0c5d
SHA256
5c9ba401c837fdc27070835ca5c9ccc2f9eac16569ea76f44999dd8a96d900d1
SHA512
a938dfe10c06714074675e1cd24645df448a7ec52f6656c52281cdc79675162d2ce1d533f3622feeb279ecdd58f4e805abe5b4b7534d88172c6d522c5ed23aa2
SSDEEP
12288:0d9Iw4evPZgQSykDC8XE7gfmsMDUbwiNthTSPOx6FH:0d9Iw4evPZg7VEcOfU8eyoK
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
HeapFree
GetProcessHeap
HeapAlloc
WriteFile
CreateProcessA
GetModuleHandleA
SetFilePointer
ReadFile
CreateDirectoryA
LocalFree
MultiByteToWideChar
GetCurrentDirectoryA
SleepEx
GlobalFree
GlobalAlloc
OpenProcess
GetCurrentProcess
lstrcmpA
LoadLibraryExA
GetTickCount
lstrcmpiA
GetFullPathNameA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetModuleFileNameA
WaitForSingleObject
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcessId
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
Sleep
CreateFileA
CloseHandle
lstrcpyA
lstrcatA
lstrlenA
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
SetLastError
InterlockedDecrement
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
lstrcpynA
WideCharToMultiByte
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetStdHandle
HeapReAlloc
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapSize
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualQuery
HeapCreate
GetFileType
GetClassNameA
EnumWindows
GetWindowThreadProcessId
GetShellWindow
GetUserObjectSecurity
IsWindow
IsWindowVisible
GetSecurityDescriptorOwner
IsValidSid
OpenProcessToken
GetTokenInformation
LookupAccountSidA
LookupPrivilegeValueA
AdjustTokenPrivileges
ConvertSidToStringSidA
RegSetValueExA
RegCreateKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
RegOpenKeyA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
ShellExecuteA
SHGetFolderPathA
ord680
CoInitialize
CoUninitialize
CoCreateInstance
VariantClear
wnsprintfA
AssocQueryStringA
StrDupA
StrChrA
PathFileExistsA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ