Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
malware_8CC02B721683F8B880C8D086ED055006DCF6155A6CD19435F74DD9296B74F5FC.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
malware_8CC02B721683F8B880C8D086ED055006DCF6155A6CD19435F74DD9296B74F5FC.exe
Resource
win10v2004-20231222-en
Target
malware_8CC02B721683F8B880C8D086ED055006DCF6155A6CD19435F74DD9296B74F5FC
Size
456KB
MD5
c6b57e042ceadb60d6fab217d3523e17
SHA1
d7c2599b2e7c68212b59c319440d27387a641650
SHA256
8cc02b721683f8b880c8d086ed055006dcf6155a6cd19435f74dd9296b74f5fc
SHA512
b73d655a49c07bf7cc6d75134a2bacf11bede80ab546ba86726def299303a7a66a516bfabd9f2d49fafee02d10bff09d0c55db25349397a80abd07680fcdaaa6
SSDEEP
6144:wEB03MbatmtkhU6f2eGpwxpUXZKIWGimc3KFHB5UNn/mRL6pXd0p9UcZY:T5atmEU6z2sgpWLsBuu1GgycO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VarCat
ExitProcess
CreateProcessA
HeapCreate
DisableThreadLibraryCalls
AreFileApisANSI
HeapSetInformation
GetFileAttributesExA
IsProcessorFeaturePresent
HeapReAlloc
HeapAlloc
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapSize
RtlUnwind
Sleep
HeapFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapDestroy
GetCurrentThread
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
DecodePointer
GetModuleHandleW
GetProcAddress
SetUnhandledExceptionFilter
GetStartupInfoW
GetCommandLineA
GdiGetBatchLimit
ImageList_SetBkColor
GetFileTitleA
GetSidSubAuthority
SetWindowTextW
SetScrollPos
ChangeDisplaySettingsW
CharUpperBuffA
EqualRect
ReuseDDElParam
SetClassWord
ModifyMenuW
CharToOemBuffW
DrawCaption
DlgDirSelectComboBoxExW
LoadCursorW
LoadAcceleratorsW
SetPropW
GetSysColorBrush
CreateWindowStationA
ReplyMessage
DialogBoxParamW
CreateAcceleratorTableA
SetWindowLongA
DlgDirSelectExW
IsCharUpperA
LoadKeyboardLayoutA
DestroyMenu
GetClassNameA
SetScrollInfo
ShowWindow
GetDC
CreateIcon
DdeInitializeA
UnhookWinEvent
LoadMenuA
SetClipboardViewer
GetWindowModuleFileNameW
SetRectEmpty
PostMessageA
SetCursorPos
GetMenu
CloseWindow
SetMenu
InsertMenuItemW
EnumWindows
SwapMouseButton
SetMenuItemBitmaps
EnumDesktopWindows
DlgDirListW
DeferWindowPos
CharToOemBuffA
DeleteMenu
DlgDirListComboBoxW
SystemParametersInfoW
ShowCursor
CopyAcceleratorTableA
GetClientRect
SetMenuContextHelpId
OemToCharBuffA
GetLastActivePopup
GetWindowModuleFileNameA
LookupIconIdFromDirectory
LoadCursorA
SetWindowsHookExW
DdeCmpStringHandles
EnumPropsExA
GetUpdateRect
DrawIcon
IsCharUpperW
IsDialogMessageW
GetForegroundWindow
GetClipboardFormatNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ