Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
11c0401e0dfb6e6c144792524e1bd615.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11c0401e0dfb6e6c144792524e1bd615.exe
Resource
win10v2004-20231215-en
Target
11c0401e0dfb6e6c144792524e1bd615
Size
1.2MB
MD5
11c0401e0dfb6e6c144792524e1bd615
SHA1
799a01b03ef70a6887361d8c792503790728846e
SHA256
1e78cb848358f25b4cd4ef26498e7822df4b11d6bdc52b8b1b2474340f7ca9d5
SHA512
47fd08f5846744a201e014448687f01057b2fd59ce629a911312b1d4d263a8204cb0f5aa7b5610fa39d799766cc8458976ad5a7d4d1bf07217b4d93527c4dfcf
SSDEEP
24576:+OEZvd+bEkM1SxPqVe6h4U/XVH38TxK9hwZ:45d+RMQqVe6iWFX8TU9G
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
ord410
ord413
GdipCreateBitmapFromStream
GdiplusShutdown
GdipAlloc
GdipFree
GdipDisposeImage
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipCloneImage
GetUserNameExW
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptMsgGetParam
WinVerifyTrust
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetOpenW
HttpOpenRequestW
HttpSendRequestW
InternetSetStatusCallbackW
HttpQueryInfoW
InternetErrorDlg
InternetQueryDataAvailable
HttpAddRequestHeadersW
InternetSetOptionW
InternetCloseHandle
AlphaBlend
GetMappedFileNameA
GetProcessMemoryInfo
GetProcessImageFileNameW
GetModuleInformation
timeBeginPeriod
timeEndPeriod
timeGetTime
SHDeleteKeyW
SHStrDupW
GetModuleHandleA
VirtualProtect
WaitForSingleObject
SetEvent
GetExitCodeProcess
GetProcessId
OpenEventW
LocalFree
CreateMutexW
DuplicateHandle
ReleaseMutex
OpenProcess
ReadFile
CreateMailslotW
CancelIo
WriteFile
SetFilePointer
SetFileTime
GetDriveTypeW
GetLogicalDrives
DeviceIoControl
GetPrivateProfileStringW
GetPrivateProfileIntW
FindResourceW
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
GlobalUnlock
GlobalFree
LockResource
GetCurrentThreadId
LoadLibraryW
MulDiv
AllocConsole
IsProcessorFeaturePresent
RemoveDirectoryW
OpenMutexW
DeleteFileW
OutputDebugStringA
SetLastError
GetTickCount
FormatMessageA
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
GetFileAttributesW
GetFileAttributesExW
GetLogicalDriveStringsW
GetLongPathNameW
GetTempFileNameW
QueryDosDeviceW
SetFileAttributesW
GetTempPathW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CopyFileW
MoveFileW
MoveFileExW
ReplaceFileW
GetCommandLineW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetStdHandle
SetStdHandle
CreatePipe
ResumeThread
AssignProcessToJobObject
VirtualAlloc
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
IsDebuggerPresent
ExpandEnvironmentStringsW
UnregisterWaitEx
GetLastError
GetVersionExW
GetNativeSystemInfo
ResetEvent
RaiseException
CreateThread
GetCurrentThread
GetThreadPriority
FlushFileBuffers
GetFileInformationByHandle
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
HeapSetInformation
GetModuleHandleExA
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetSystemDirectoryW
GetWindowsDirectoryW
QueueUserWorkItem
GetModuleHandleExW
SetEnvironmentVariableW
SetUnhandledExceptionFilter
RtlCaptureContext
InitializeCriticalSection
ReleaseSemaphore
OpenThread
SuspendThread
GetThreadContext
VirtualQueryEx
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
DeleteFileA
DebugActiveProcess
DebugActiveProcessStop
GetSystemTime
ReadProcessMemory
UnregisterWait
GetFileSize
CreateToolhelp32Snapshot
Thread32First
Thread32Next
Module32FirstW
Module32NextW
LocalAlloc
FindResourceExW
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
HeapSize
DecodePointer
lstrlenA
GetCurrentProcessId
WaitForMultipleObjects
CreateEventW
LoadLibraryA
GetProcAddress
GetModuleFileNameW
TerminateProcess
Sleep
GetModuleHandleW
GetCurrentProcess
CreateProcessW
GetEnvironmentVariableW
CloseHandle
GetFileType
RtlUnwind
UnhandledExceptionFilter
GetStartupInfoW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
GetTimeZoneInformation
GetStringTypeW
ReadConsoleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
CreateFileW
EncodePointer
ExitProcess
AreFileApisANSI
GetConsoleCP
GetConsoleMode
RegisterWaitForSingleObject
GetFullPathNameW
EnumSystemLocalesW
CreateProcessA
OutputDebugStringW
SetEnvironmentVariableA
GetUserDefaultLangID
GetUserDefaultUILanguage
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
GetProcessTimes
SetHandleInformation
LoadLibraryExA
SwitchToThread
SetTextColor
GetDeviceCaps
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateFontW
GetObjectW
GetTextExtentExPointW
GetStockObject
BitBlt
AllocateAndInitializeSid
SetSecurityInfo
SetEntriesInAclW
BuildTrusteeWithSidW
RegGetKeySecurity
AdjustTokenPrivileges
CheckTokenMembership
LookupPrivilegeValueW
DuplicateToken
AccessCheck
GetExplicitEntriesFromAclW
GetUserNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
CreateProcessAsUserW
RegCloseKey
RegOpenKeyExW
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExW
RegSetValueExA
BuildExplicitAccessWithNameW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
FreeSid
GetSecurityInfo
CoInitializeEx
CreateStreamOnHGlobal
CoTaskMemFree
PropVariantClear
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
VariantChangeType
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
VariantTimeToSystemTime
GetWindowLongW
LoadIconW
DestroyWindow
HideCaret
EnumThreadWindows
IsWindowVisible
IsWindowEnabled
SetForegroundWindow
DestroyIcon
MessageBoxW
UnhookWindowsHookEx
SetWindowsHookExW
CreateWindowExW
SetWindowPos
GetSysColor
ReleaseDC
GetWindowTextW
InvalidateRect
GetDC
BeginPaint
SetFocus
GetClientRect
FillRect
GetWindowRect
ScreenToClient
GetWindowTextLengthW
EndPaint
GetDlgItem
CharUpperW
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
WaitMessage
DefWindowProcW
PostQuitMessage
UnregisterClassW
RegisterClassExW
CallMsgFilterW
GetQueueStatus
MsgWaitForMultipleObjectsEx
SetTimer
KillTimer
ShowWindow
CreateDialogParamW
SendMessageW
EnableWindow
SetWindowTextW
AllowSetForegroundWindow
SendNotifyMessageW
IsDialogMessageW
SetWindowLongW
GetSysColorBrush
CreateEnvironmentBlock
DestroyEnvironmentBlock
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE