Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
e3a406607f9de0b40935b0838b40f60dee58f63e69490f7dd9320d0e3293153c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e3a406607f9de0b40935b0838b40f60dee58f63e69490f7dd9320d0e3293153c.exe
Resource
win10v2004-20231222-en
Target
aa8c860b523bd4cbcf9fa48074c73489.bin
Size
97KB
MD5
3f808d2aee74e1f756b97894a9ed73e9
SHA1
e4280897256cbb395534053a656dfdc720c1e81e
SHA256
dfa788e80ada71bb8d32099e0ae8fa8bff9d7b1f6883af41f32326b40580345e
SHA512
9a5fc5d7ad2a2787f3bb2089889c0160f76eb918d1a8318d0dfc17e6565907e4ddf3d1745f68f088e83434d7c234dcb14156ec7e2d0b30d126eb2504d58fe84b
SSDEEP
1536:IGA3sjAGuayRNr0uBVhO1nMBQqLwnl1gXXxyDtNBbks3v91J7CvNpk:IGRjAGlyds2CqL4DgngBrhnJ7t
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
GetModuleHandleA
GetProcAddress
ExitProcess
GetModuleHandleW
BuildCommDCBAndTimeoutsA
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleHandleExW
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
DecodePointer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ