Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2671bbc10668d673e20a014dd7b0a084.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2671bbc10668d673e20a014dd7b0a084.exe
Resource
win10v2004-20231215-en
Target
2671bbc10668d673e20a014dd7b0a084
Size
719KB
MD5
2671bbc10668d673e20a014dd7b0a084
SHA1
0441bd88796341f740eb8fb6e559798ad2174051
SHA256
5871042606e83640a1126ea33e77d28f23b7877fcae7a4c2452d1e244fad16cb
SHA512
5a84b6b2302d88683cb9874f69f96927a55a0bce1696f4643c7ba9c55fa3165be3223d17f78fab03f53964955b21a673ccc5ae01277bcbb91c03a5ffad64e0a5
SSDEEP
12288:r+7lT7QRmstU7YJr2etQlVeZfdcb3HkREn1hcZxXIQU1yCwr0X888888888888Wv:rSlQREa2etQlVeZ1cb3HkR4axuyF
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
OpenProcessToken
GetTokenInformation
GetLengthSid
GetKernelObjectSecurity
QueryServiceStatus
OpenServiceW
OpenSCManagerW
DeleteService
ControlService
CloseServiceHandle
LoadStringW
MessageBoxA
CharNextW
WaitForInputIdle
TranslateMessage
SystemParametersInfoW
ShowWindow
ShowOwnedPopups
SetWindowPos
SetWindowPlacement
SetWindowLongW
SetPropA
SetParent
SetForegroundWindow
SetClassLongW
SendMessageTimeoutA
SendMessageTimeoutW
SendMessageCallbackA
SendMessageA
SendMessageW
RemovePropA
PostThreadMessageA
PostMessageA
OffsetRect
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
IsZoomed
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsIconic
GetWindowThreadProcessId
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetTopWindow
GetSystemMetrics
GetPropA
GetParent
GetWindow
GetMessageW
GetMenu
GetForegroundWindow
GetClientRect
GetClassNameA
GetClassLongW
FindWindowExA
FindWindowExW
FindWindowW
EnumWindows
EnumThreadWindows
EnableWindow
DispatchMessageW
DestroyWindow
DestroyIcon
ChildWindowFromPointEx
CharUpperBuffW
CharNextW
CharLowerBuffW
AttachThreadInput
CharLowerBuffA
CharUpperBuffA
AdjustWindowRectEx
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrlenW
lstrcmpA
WriteProcessMemory
WriteFile
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjectsEx
VirtualQueryEx
VirtualQuery
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateThread
TerminateProcess
SwitchToThread
SuspendThread
Sleep
SignalObjectAndWait
SetThreadPriority
SetThreadContext
SetThreadAffinityMask
SetPriorityClass
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
ReleaseMutex
ReadProcessMemory
ReadFile
PulseEvent
OutputDebugStringW
OpenProcess
OpenFileMappingA
OpenFileMappingW
OpenEventA
MultiByteToWideChar
MapViewOfFile
LockResource
LocalFree
LocalAlloc
LoadResource
LoadLibraryExA
LoadLibraryA
LoadLibraryW
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetVersionExA
GetVersionExW
GetVersion
GetThreadPriority
GetThreadLocale
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetSystemDirectoryW
GetStringTypeExA
GetStringTypeExW
GetStdHandle
GetStartupInfoW
GetProcessVersion
GetProcessAffinityMask
GetProcAddress
GetPriorityClass
GetModuleHandleA
GetModuleHandleW
GetModuleFileNameA
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesA
GetFileAttributesW
GetExitCodeThread
GetExitCodeProcess
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetCPInfo
GetACP
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
FreeLibrary
FormatMessageA
FormatMessageW
FindResourceW
FindFirstFileA
FindClose
ExitProcess
EnumCalendarInfoW
EnterCriticalSection
DuplicateHandle
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateProcessW
CreateMutexA
CreateMutexW
CreateFileMappingA
CreateFileMappingW
CreateFileA
CreateFileW
CreateEventA
CreateEventW
CompareStringA
CompareStringW
CloseHandle
Sleep
GetVersionExW
CreateMutexW
VerQueryValueA
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
SHGetFileInfoA
Shell_NotifyIconW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
GetHGlobalFromStream
CreateStreamOnHGlobal
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
ImageList_Write
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ