Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f33bcb2c0ed280e00d72e5bed4f2b204fb44c65c0af44a329d8be30a954daf82.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f33bcb2c0ed280e00d72e5bed4f2b204fb44c65c0af44a329d8be30a954daf82.exe
Resource
win10v2004-20231215-en
Target
f33bcb2c0ed280e00d72e5bed4f2b204fb44c65c0af44a329d8be30a954daf82
Size
929KB
MD5
25fac521863dc90be908659dae3ff276
SHA1
8d033649eb6c01857aabd7e21198976f642b33e3
SHA256
f33bcb2c0ed280e00d72e5bed4f2b204fb44c65c0af44a329d8be30a954daf82
SHA512
c9d899719864211e687858464f4fa099437fdc4bc765ebd9495fdbec3f1dfcc1ba4cc94274ed41a1a225f71c4ab2e4e7e4d0be60403dc0c8da309befc5ca02fc
SSDEEP
24576:15GpcvIRxr60jYdS329vJqg94hLAxkp7iz:15ccvIRxgNXqgWkD
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
IsValidSid
GetLengthSid
ConvertStringSidToSidW
ConvertSidToStringSidW
EqualSid
CreateProcessAsUserW
SetThreadToken
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
LookupPrivilegeValueW
CreateRestrictedToken
AdjustTokenPrivileges
FreeSid
ImpersonateLoggedOnUser
GetAce
RegCreateKeyExW
RegQueryValueExW
SystemFunction036
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetNamedSecurityInfoW
GetSecurityInfo
SetSecurityInfo
MapGenericMask
AccessCheck
IsValidAcl
InitializeAcl
AddMandatoryAce
BuildTrusteeWithSidW
SetEntriesInAclW
SymGetLineFromAddr64
SymFromAddr
SymCleanup
SymSetOptions
SymGetSearchPathW
SymSetSearchPathW
SymInitialize
RtlVirtualUnwind
RtlUnwindEx
RtlCaptureStackBackTrace
RtlInitUnicodeString
VerSetConditionMask
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlCaptureContext
RtlUnwind
CommandLineToArgvW
SHGetKnownFolderPath
CreateAppContainerProfile
DeriveAppContainerSidFromAppContainerName
GetAppContainerRegistryLocation
GetAppContainerFolderPath
timeGetTime
GetProcessHeap
GetOEMCP
IsValidCodePage
HeapSize
ReadConsoleW
HeapReAlloc
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapFree
HeapAlloc
GetACP
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleCP
GetCommandLineA
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
DeleteCriticalSection
GetModuleFileNameA
GetCommandLineW
ExpandEnvironmentStringsW
GetModuleFileNameW
SetEnvironmentVariableW
ExpandEnvironmentStringsA
GetEnvironmentVariableW
GetEnvironmentVariableA
WaitForSingleObject
UnmapViewOfFile
SetCurrentDirectoryA
GetLastError
GetFileAttributesA
SetEvent
LoadLibraryA
CloseHandle
CreateThread
GetCurrentDirectoryW
GetProcAddress
CreateFileMappingA
GetCurrentProcessId
FreeLibrary
WideCharToMultiByte
OpenFileMappingA
VerifyVersionInfoW
CreateEventA
MapViewOfFile
SetDllDirectoryW
CreateIoCompletionPort
CreateEventW
SetLastError
ResetEvent
GetQueuedCompletionStatus
RegisterWaitForSingleObject
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
GetModuleHandleExW
SetInformationJobObject
GetCurrentProcess
DuplicateHandle
GetCurrentThreadId
TerminateProcess
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
HeapDestroy
GetTickCount
CreateFileW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
GetCurrentThread
Sleep
IsDebuggerPresent
RaiseException
GetModuleHandleW
GetThreadId
GetFileType
SetHandleInformation
SetDefaultDllDirectories
HeapSetInformation
SetThreadInformation
GetProcessMitigationPolicy
SetProcessMitigationPolicy
GetVersionExW
GetProductInfo
GetNativeSystemInfo
IsWow64Process
LocalFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteProcessMemory
CreateFileMappingW
ReadProcessMemory
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
LoadLibraryExW
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
CreateNamedPipeW
CreateJobObjectW
QueryInformationJobObject
VirtualAllocEx
VirtualProtectEx
GetModuleHandleA
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateMutexW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
VirtualFreeEx
GetProcessHandleCount
SetUnhandledExceptionFilter
TlsGetValue
DebugBreak
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
ReadFile
SetEndOfFile
FlushFileBuffers
CreateRemoteThread
MultiByteToWideChar
FindClose
FindNextFileW
FindFirstFileExW
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
CloseWindowStation
CloseDesktop
LoadStringW
MessageBoxA
AllowSetForegroundWindow
MessageBoxW
GetUserObjectInformationW
LoadStringA
CoTaskMemFree
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ