Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2b5f8eb8fa7bbcf9e23a2081b138644a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b5f8eb8fa7bbcf9e23a2081b138644a.exe
Resource
win10v2004-20231222-en
Target
2b5f8eb8fa7bbcf9e23a2081b138644a
Size
1.1MB
MD5
2b5f8eb8fa7bbcf9e23a2081b138644a
SHA1
8116d536d7bdd7d05e137f64a6c05afeb6a9ba64
SHA256
f5eefbe3161443d0f8e14c8f2e82e16619846b24b0ae8f474dc654ea0d2c7442
SHA512
1ed2b059f733fa35e4315959a1b463a0645151abe45170a32931efc9401a18eb04aba955fc68856fa37792961e7786de80a78fd34a050cf8a81dae6a77499d4c
SSDEEP
24576:h93MiiAcSf85Sjo3VRFjLuHdx4liM+nFm6Jf8tGL6t0Oly/efQ:hFMDfSE5SjkRFj4WlAnD2t0wy
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrStrA
StrNCatA
StrStrIA
wnsprintfA
StrChrA
StrToIntA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
LocalAlloc
LocalFree
CreateThread
GetLocalTime
GetVersionExA
GetCurrentProcessId
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
FindResourceA
GetExitCodeProcess
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
FreeResource
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
MulDiv
GlobalUnlock
GlobalFree
LockResource
MoveFileExA
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
InitializeCriticalSectionAndSpinCount
RtlUnwind
WritePrivateProfileStringA
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
GetPrivateProfileStringA
GetCurrentProcess
FreeLibrary
ReadFile
WriteFile
HeapFree
HeapAlloc
GetFileSize
CreateFileA
lstrcpyA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
Process32First
DeleteFileA
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetLastError
CreateDirectoryA
lstrlenW
lstrcatA
Sleep
GetWindowsDirectoryA
GetProcessHeap
GetTickCount
lstrcpynA
lstrlenA
lstrcmpA
ExitProcess
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
TlsGetValue
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
ReleaseDC
GetDlgItem
SetWindowTextA
MoveWindow
GetWindowDC
DrawFocusRect
GetDlgCtrlID
EndPaint
SetCursor
GetKeyState
GetFocus
GetParent
DrawTextA
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
MessageBoxA
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
FindWindowA
ExitWindowsEx
IsWindowEnabled
CreateDIBitmap
LPtoDP
GetDeviceCaps
DPtoLP
SetMapMode
GetMapMode
SetBkColor
GetStockObject
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetTextExtentPointA
TextOutA
GetObjectA
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
SetNamedSecurityInfoA
CheckTokenMembership
RegOpenKeyExA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegQueryValueExA
OpenProcessToken
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
ShellExecuteA
SHGetFolderPathA
ShellExecuteExA
CreateStreamOnHGlobal
OleLoadPicture
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ