Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
977BDA1C741D11624909B2C7036119D3D7A7D0FD64B0A0205F7D8A86ACE7FBDD.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
977BDA1C741D11624909B2C7036119D3D7A7D0FD64B0A0205F7D8A86ACE7FBDD.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
977BDA1C741D11624909B2C7036119D3D7A7D0FD64B0A0205F7D8A86ACE7FBDD.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
977BDA1C741D11624909B2C7036119D3D7A7D0FD64B0A0205F7D8A86ACE7FBDD.exe
Resource
win10v2004-20231222-en
Target
977BDA1C741D11624909B2C7036119D3D7A7D0FD64B0A0205F7D8A86ACE7FBDD.zip
Size
421KB
MD5
545fe86bfdb6f7df8b3eb85f2d1e5b0e
SHA1
ea596b2ac0dfcd7a18e76ea6b56ad793ff1be5be
SHA256
4639e5b186d992eece0e719fcab6aa1e1d349a54c4c25810d49befe64324c530
SHA512
d3ca4c6f803b658509f2f317b5b185d4dc91de6efeaa322989308fc9045682916b041a54dfc4305260b9971b84ff077f7805fbcf4d1f3698faf936adfc474b14
SSDEEP
12288:58qZKgmRUnXUbWxedQem/mQsJ4pXP9tGPBnn:517m2QWAQXebKXP3ah
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
ReadConsoleW
SetEnvironmentVariableA
InitializeCriticalSection
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetDriveTypeA
GetDriveTypeW
GetFileAttributesA
GetFileAttributesExA
GetFileAttributesExW
GetFullPathNameA
GetFullPathNameW
GetVolumeInformationW
RemoveDirectoryA
RemoveDirectoryW
SetFileAttributesA
SetFileAttributesW
DeviceIoControl
GetShortPathNameA
LoadLibraryA
GetTempPathA
GetTempFileNameA
MoveFileA
CompareStringW
MoveFileExA
MoveFileExW
SetVolumeLabelA
SetVolumeLabelW
GetVolumeInformationA
SetEndOfFile
SetFilePointer
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
WriteConsoleW
HeapReAlloc
HeapAlloc
HeapSize
LoadLibraryW
OutputDebugStringW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
GetProcessHeap
GetCurrentThreadId
GetCPInfo
GetOEMCP
GetACP
GetShortPathNameW
IsValidCodePage
SetConsoleCtrlHandler
LoadLibraryExW
FreeLibrary
HeapFree
WriteFile
GetStdHandle
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
RaiseException
GetCommandLineW
AreFileApisANSI
GetProcAddress
GetModuleHandleExW
ExitProcess
DecodePointer
EncodePointer
SetStdHandle
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
VirtualFree
VirtualAlloc
GetCurrentProcess
GetFileAttributesW
GetPrivateProfileStringA
WritePrivateProfileStringA
SetFileTime
CreateFileA
GetVersion
InterlockedDecrement
InterlockedIncrement
ReadConsoleInputA
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
MultiByteToWideChar
GetLastError
CopyFileW
DeleteFileW
CreateFileW
GetTempFileNameW
GetTempPathW
CreateProcessW
GetModuleFileNameW
CloseHandle
Sleep
WaitForSingleObject
GetCurrentProcessId
OpenProcess
MoveFileW
IsDBCSLeadByte
FlushConsoleInputBuffer
GlobalMemoryStatus
GetVersionExA
GetModuleHandleA
SetConsoleMode
wsprintfW
GetDesktopWindow
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
CoTaskMemAlloc
CoTaskMemFree
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
CryptAcquireContextW
CryptDestroyKey
CryptReleaseContext
CryptGenRandom
DeregisterEventSource
RegisterEventSourceA
ReportEventA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ