Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
14124135ca04b1d214b99dba26254dad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14124135ca04b1d214b99dba26254dad.exe
Resource
win10v2004-20231215-en
Target
14124135ca04b1d214b99dba26254dad
Size
493KB
MD5
14124135ca04b1d214b99dba26254dad
SHA1
cbe61c398f9cea1410314e345858495b5a9b5126
SHA256
e6c267808020867c21e52bcabad26cf8d3f666864abe6348c12977af1370d8df
SHA512
aa404e367ccf82d922b6efa4ee03d42993494e4d1d0ff78d765b44b034b57dc6116b7d2c854c7c97462554913133ef39800807e0d7f1632fe4de0269473f3276
SSDEEP
12288:oubinfE7jntwzwggS61Fx17888888888888W88888888888u1s888888888888WM:xic7jntwzwS61D1o194
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SysFreeString
SysAllocStringLen
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegCreateKeyExW
CheckTokenMembership
LoadStringW
MessageBoxA
CharNextW
CreateWindowExW
keybd_event
WindowFromPoint
WaitMessage
TranslateMessage
SystemParametersInfoW
ShowWindow
SetWindowPos
SetTimer
SetScrollInfo
SetParent
SetForegroundWindow
SetFocus
SetCursor
SetCapture
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterClassW
PtInRect
PostQuitMessage
OffsetRect
MessageBoxW
LockWindowUpdate
LoadStringW
KillTimer
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InvalidateRect
InflateRect
GetWindowTextW
GetWindowRect
GetUpdateRgn
GetSystemMetrics
GetSystemMenu
GetSysColor
GetScrollPos
GetScrollInfo
GetParent
GetKeyboardState
GetKeyState
GetIconInfo
GetFocus
GetDC
GetCursorPos
GetClientRect
GetClassInfoW
GetAsyncKeyState
FillRect
EndPaint
EnableWindow
EnableMenuItem
DrawIconEx
DestroyWindow
DestroyIcon
DeleteMenu
CopyImage
ClientToScreen
CharUpperBuffW
CharLowerBuffW
BeginPaint
wvsprintfW
SetWindowLongW
SetPropW
SendMessageW
PostMessageW
PeekMessageW
MessageBoxW
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
GetWindowTextLengthW
GetWindowLongW
GetPropW
GetClassLongW
GetClassInfoW
DrawTextW
DispatchMessageW
DefWindowProcW
CallWindowProcW
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrcpyW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
TerminateThread
TerminateProcess
SystemTimeToFileTime
Sleep
SizeofResource
SignalObjectAndWait
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
SetCurrentDirectoryW
ResumeThread
ResetEvent
ReadFile
OpenProcess
MultiByteToWideChar
LocalFree
LoadResource
LoadLibraryA
LoadLibraryW
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
GlobalUnlock
GlobalLock
GetVersionExW
GetVersion
GetTickCount
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetExitCodeThread
GetExitCodeProcess
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindFirstFileExW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
EnumCalendarInfoW
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateEventW
CopyFileW
CompareStringW
CloseHandle
WritePrivateProfileStringW
QueryDosDeviceW
LoadLibraryW
GetVolumeInformationW
GetVersionExW
GetTempPathW
GetTempFileNameW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
GetPrivateProfileIntW
GetModuleHandleW
GetModuleFileNameW
GetFileAttributesW
GetDateFormatW
GetCommandLineW
FormatMessageW
FindResourceW
FindNextFileW
DeleteFileW
CreateProcessW
CreateFileW
CreateDirectoryW
SetTextColor
SetROP2
SetBrushOrgEx
SetBkMode
SetBkColor
SelectObject
MoveToEx
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
GetTextExtentPoint32W
GetObjectW
CreateFontIndirectW
InitCommonControls
InternetSetStatusCallback
InternetSetOptionW
InternetReadFile
InternetOpenW
InternetConnectW
InternetCloseHandle
HttpSendRequestW
HttpQueryInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
IsEqualGUID
FindMimeFromData
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipDisposeImage
GdipDrawImageRectI
GdipGraphicsClear
GdipCreateFromHDC
GdipDeleteGraphics
GdiplusShutdown
GdiplusStartup
ShellExecuteW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
PathGetCharTypeW
CryptBinaryToStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ