Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
05feca1b4b1f7f9d924191716ad3f0ba.exe
Resource
win7-20231129-en
Target
05feca1b4b1f7f9d924191716ad3f0ba
Size
452KB
MD5
05feca1b4b1f7f9d924191716ad3f0ba
SHA1
ecc7347ae9d83bf9cadced06310069abd822d08c
SHA256
d3e37331bb4b3819c2889c3460f6951a34cf7852f73c0c569999db21dc700071
SHA512
d3d1bf6f69ab86937ff5b10775adb9d71aa087e176ee23d9214816bbe5e12f4713f83169d11d87130aeb55355ffbaad5c36923de00cdb5e447858328f475bcf0
SSDEEP
12288:QiWF8jURnLKL8T8v4tnMx0hnUn7NXGb5BjIdlHFZ0:QivUxo8wv4nMxSnyU/jyHFZ0
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleW
DeleteFileW
EnumResourceNamesW
LocalFree
lstrlenW
GetModuleFileNameW
GetCurrentProcessId
SetCurrentDirectoryW
GetCommandLineW
ExitProcess
FindResourceW
SizeofResource
WriteFile
CreateFileW
LockResource
LoadResource
GlobalFree
GlobalAlloc
lstrcatW
SetEvent
GetCurrentDirectoryW
CreateEventW
GetExitCodeProcess
GetProcessId
GetCurrentProcess
CreateDirectoryW
GetFileAttributesW
RemoveDirectoryW
FindNextFileW
FindClose
FindFirstFileW
GetLongPathNameW
GetTempFileNameW
GetTempPathW
ReadFile
SetFilePointer
LoadLibraryW
GetProcAddress
FreeLibrary
WaitForSingleObject
CreateThread
OpenFileMappingW
GetLastError
MapViewOfFile
UnmapViewOfFile
GetVersionExW
CloseHandle
GetWindowThreadProcessId
EnumWindows
MoveWindow
LoadStringW
PostMessageW
SetWindowPos
CreateWindowExW
TranslateMessage
DispatchMessageW
GetMessageW
DestroyWindow
UnregisterClassW
DefWindowProcW
SetForegroundWindow
GetSystemMetrics
RegisterClassW
SetLayeredWindowAttributes
RegCloseKey
RegOpenKeyExW
CreateProcessAsUserW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
DuplicateTokenEx
OpenProcessToken
GetTokenInformation
RegQueryValueExW
CommandLineToArgvW
ShellExecuteExW
SHFileOperationW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ