Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2cdc4d24a4b85fd4aae992dfcb49e8bfa447af6d838a04659bffcf5955350a5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cdc4d24a4b85fd4aae992dfcb49e8bfa447af6d838a04659bffcf5955350a5b.exe
Resource
win10v2004-20231222-en
Target
2cdc4d24a4b85fd4aae992dfcb49e8bfa447af6d838a04659bffcf5955350a5b
Size
943KB
MD5
f6331a36f9505d6925ee1f33ee16a1fc
SHA1
fcfe76f154ab25ea346d1fcf583ab261af5900c6
SHA256
2cdc4d24a4b85fd4aae992dfcb49e8bfa447af6d838a04659bffcf5955350a5b
SHA512
6d2cd03e5e7549e83fe37f4c36d28bf051a5e998066eddfcb4128529defb9b3f2c8f48caa12762916e208b17e017133b77f965bf17a26efe61d326a6d8462879
SSDEEP
24576:IO25yT/tMbHWc8eC9TqOF12+lm/HIpUqpH1kVlFKXUfrEH7bR:IO2wTKbHqlgBInpVkDwd
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetEvent
GetVersionExW
GetCommandLineW
GetWindowsDirectoryW
OutputDebugStringW
DeviceIoControl
CreateFileW
WriteFile
SetFilePointer
SetEndOfFile
GetFileSize
FileTimeToSystemTime
FileTimeToLocalFileTime
WideCharToMultiByte
QueryDosDeviceW
lstrlenA
LoadLibraryW
GetEnvironmentVariableA
SystemTimeToFileTime
FindClose
FindFirstFileW
GetStdHandle
FlushViewOfFile
InterlockedCompareExchange
GetProcessHeap
OutputDebugStringA
WaitForSingleObjectEx
UnmapViewOfFile
UnlockFileEx
UnlockFile
ReadFile
QueryPerformanceCounter
MapViewOfFile
LockFileEx
LockFile
LoadLibraryA
HeapCompact
HeapValidate
HeapSize
HeapReAlloc
HeapFree
LocalFree
HeapCreate
HeapAlloc
GetVersionExA
GetTempPathW
GetTempPathA
GetSystemTimeAsFileTime
GetSystemInfo
GetFullPathNameW
GetFullPathNameA
GetFileAttributesExW
GetFileAttributesW
GetFileAttributesA
GetDiskFreeSpaceW
GetDiskFreeSpaceA
GetCurrentProcessId
FormatMessageW
FormatMessageA
FlushFileBuffers
DeleteFileA
CreateMutexW
CreateFileMappingW
CreateFileMappingA
CreateFileA
AreFileApisANSI
TryEnterCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCurrentDirectoryA
InitializeCriticalSectionAndSpinCount
DeleteFileW
lstrcpyW
GetPrivateProfileStringW
lstrcmpW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
WTSGetActiveConsoleSessionId
GetSystemTime
CreateEventW
CreateThread
WaitForSingleObject
lstrlenW
GetCurrentThreadId
Sleep
GetCurrentProcess
CloseHandle
GetVersion
FindResourceExW
LockResource
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
InterlockedDecrement
InterlockedIncrement
lstrcmpiW
GetModuleHandleW
GetProcAddress
GetTickCount
ProcessIdToSessionId
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
HeapDestroy
SetStdHandle
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
GetModuleHandleA
VirtualAlloc
VirtualFree
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetCPInfo
LCMapStringW
LCMapStringA
GetDriveTypeA
FindNextFileA
FindFirstFileA
ExitProcess
ExitThread
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
TranslateMessage
DispatchMessageW
GetMessageW
MessageBoxW
CharNextW
LoadStringW
CharUpperW
PostThreadMessageW
OpenProcessToken
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
LookupAccountNameW
ConvertSidToStringSidW
RegEnumKeyW
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserW
RevertToSelf
ChangeServiceConfigW
ChangeServiceConfig2W
OpenEventLogW
GetOldestEventLogRecord
GetNumberOfEventLogRecords
ReadEventLogW
CloseEventLog
RegOpenKeyW
ControlService
DeleteService
CreateServiceW
SetServiceStatus
RegisterEventSourceW
ReportEventW
DeregisterEventSource
OpenSCManagerW
OpenServiceW
CloseServiceHandle
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoInitializeSecurity
CoInitialize
CoUninitialize
StringFromGUID2
SHGetFolderPathW
ord165
SysFreeString
VarUI4FromStr
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantInit
VariantClear
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
SysAllocStringLen
PathMatchSpecW
PathFileExistsW
SHRegGetPathW
CreateEnvironmentBlock
UnloadUserProfile
GetUserProfileDirectoryW
LoadUserProfileW
DestroyEnvironmentBlock
WTSQuerySessionInformationW
WTSQueryUserToken
WTSFreeMemory
PdhCollectQueryData
PdhAddCounterW
PdhEnumObjectItemsW
PdhOpenQueryW
PdhCloseQuery
PdhRemoveCounter
PdhGetFormattedCounterValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ