Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2ff1de08b3b18a31d3a463402cf39ad3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ff1de08b3b18a31d3a463402cf39ad3.exe
Resource
win10v2004-20231215-en
Target
2ff1de08b3b18a31d3a463402cf39ad3
Size
747KB
MD5
2ff1de08b3b18a31d3a463402cf39ad3
SHA1
ff397c6ab6b617b4a706be954d83415e89c5a408
SHA256
34c0db1ef4ccb847e5a7dfeba75fc1165d22a3ba56d179f6284cca278b26c7dc
SHA512
abb22ce0aae2f88b8735a8a95d99657be1f2aeed4d1090b7d1ecc5cfc069c8ad7a058e710bb3b16732faf7deb865a8cbf4ee01a717fbaf1b56cc75f18e8ab971
SSDEEP
12288:7WWv9dDWT4QRRFG1beh2WYZm1wjLqJWO6wocpTKdLw/RA/Q/9/PF8:td6T4QRRFsbDGwjmAkdKFgC/i18
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrToIntA
StrChrA
StrNCatA
wnsprintfA
StrStrIA
StrStrA
UuidCreate
UuidToStringA
GetLocalTime
GetVersionExA
GetTickCount
GetCurrentProcessId
CreateThread
GetTempPathA
MoveFileExA
SetFilePointer
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
RtlUnwind
IsDebuggerPresent
lstrcpyA
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
GetStdHandle
GetModuleHandleW
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
LocalFree
CreateMutexA
GetModuleFileNameA
LocalAlloc
GetLastError
ReadFile
VirtualQuery
Sleep
lstrcmpA
GetFileSize
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateDirectoryA
DeleteFileA
LoadLibraryA
GetProcAddress
lstrcatA
GetWindowsDirectoryA
GetCurrentProcess
FreeLibrary
lstrcpynA
lstrlenA
CloseHandle
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
CreateFileA
RaiseException
UnhandledExceptionFilter
DeleteCriticalSection
VirtualFree
HeapCreate
GetStartupInfoA
GetCommandLineA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
GetDC
ReleaseDC
GetDlgItem
SetWindowTextA
EndPaint
LoadBitmapA
GetParent
IsWindowEnabled
BeginPaint
GetWindowTextA
SetWindowLongA
GetWindowTextLengthA
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
TranslateMessage
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
MessageBoxA
FindWindowA
RedrawWindow
DrawTextA
ExitWindowsEx
wsprintfA
SetCursor
InvalidateRect
CreateDIBitmap
GetStockObject
SetBkColor
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
DeleteObject
SelectObject
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
TextOutA
SetBkMode
AdjustTokenPrivileges
RegOpenKeyExA
LookupPrivilegeValueA
SetFileSecurityA
GetSecurityDescriptorSacl
FreeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
SetNamedSecurityInfoA
SetEntriesInAclA
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
RegCloseKey
RegOpenKeyA
SHGetFolderPathA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ