Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3b6b28a0f855e4fedf5262ed7dd85314.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b6b28a0f855e4fedf5262ed7dd85314.exe
Resource
win10v2004-20231222-en
Target
3b6b28a0f855e4fedf5262ed7dd85314
Size
280KB
MD5
3b6b28a0f855e4fedf5262ed7dd85314
SHA1
672daff008f5c82d98d0c546030898252c313cff
SHA256
06c3813678f4bb627ee254c7ddc0513e3d0e99a7634d2f71877dd65a7b2e1aa5
SHA512
9f21cf2a403c37ba214c24415397f0d3a690fbe5cff6bf9550d305b7dc787d33788fa677cf9c6a0511c41d53bf327d3a12f39aea40c9fbf627e8dee9d137a1ea
SSDEEP
3072:w5Tng5mBWi6+HB7+bZl9vmnDxDkU/CORf2Rx+tm/Tiima24SB/Is9SDj:w+5mBWIOZlpmD7Cuu5nG/hUf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
Sleep
RaiseException
IsDebuggerPresent
GetCurrentThreadId
CloseHandle
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetHandleInformation
VirtualFree
GetProcessHandleCount
GetCurrentProcessId
FreeLibrary
HeapSetInformation
GetCurrentDirectoryW
TerminateProcess
GetFileType
SignalObjectAndWait
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetModuleHandleExW
SetLastError
GetVolumeInformationW
LocalFree
GetLastError
GetSystemDirectoryW
GetComputerNameW
ExpandEnvironmentStringsW
LoadLibraryExA
GetModuleHandleA
VirtualAllocEx
VirtualProtectEx
GetProcAddress
VerifyVersionInfoW
FlushInstructionCache
GetModuleHandleW
SetEnvironmentVariableW
GetCurrentProcess
VerSetConditionMask
SetDllDirectoryW
GetEnvironmentVariableW
ReleaseActCtx
MultiByteToWideChar
CreateActCtxW
VirtualQuery
GetCommandLineW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
HeapFree
HeapAlloc
LoadLibraryExW
ExitProcess
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetStartupInfoW
WriteFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
RtlUnwind
OutputDebugStringW
HeapReAlloc
timeGetTime
RegCloseKey
RegOpenKeyExW
RevertToSelf
RegDisablePredefinedCache
GetLengthSid
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
ConvertSidToStringSidW
LookupAccountNameW
?ProvideLogFunction@sandboxing@mozilla@@YAXP6AXPBD00_NI@Z@Z
IsSandboxedProcess
_TargetCreateNamedPipeW@36
_TargetCreateProcessA@44
_TargetCreateProcessW@44
_TargetGdiDllInitialize@12
_TargetGetStockObject@8
_TargetNtCreateEvent@24
_TargetNtCreateFile@48
_TargetNtCreateKey@32
_TargetNtMapViewOfSection@44
_TargetNtOpenEvent@16
_TargetNtOpenFile@28
_TargetNtOpenKey@16
_TargetNtOpenKeyEx@20
_TargetNtOpenProcess@20
_TargetNtOpenProcessToken@16
_TargetNtOpenProcessTokenEx@20
_TargetNtOpenThread@20
_TargetNtOpenThreadToken@20
_TargetNtOpenThreadTokenEx@24
_TargetNtQueryAttributesFile@12
_TargetNtQueryFullAttributesFile@12
_TargetNtSetInformationFile@24
_TargetNtSetInformationThread@20
_TargetNtUnmapViewOfSection@12
_TargetRegisterClassW@8
g_handles_to_close
g_interceptions
g_nt
g_originals
g_shared_IPC_size
g_shared_delayed_integrity_level
g_shared_delayed_mitigations
g_shared_policy_size
g_shared_section
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE