Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_b434627da0a9cdaa97471a295e613659_lockbit.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_b434627da0a9cdaa97471a295e613659_lockbit.exe
Resource
win10v2004-20231215-en
Target
2024-01-26_b434627da0a9cdaa97471a295e613659_lockbit
Size
346KB
MD5
b434627da0a9cdaa97471a295e613659
SHA1
89f40c3974ebd0cfa420e20eaf5da50cafc53005
SHA256
8ce411d2de4bd0af43e2492137c2450f8f60ff2fc3cf2b4ee77a724f642b7fbb
SHA512
6314bc24294ff6f15e15e7456d56f04c7a812fa875bfd4215e7e351c50f3bc1b409dbc5d03ef7192d5ede8de6512ea71bb5506bc38c11118ed918719f006c056
SSDEEP
6144:qhZ76vmBN1T9gitzFE7kFTBD086zn6xqdJ:eZ2uBSCKKxq6xGJ
resource | yara_rule |
---|---|
sample | INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
CopyFileW
OutputDebugStringW
GetStartupInfoW
TerminateThread
GetSystemInfo
VirtualQuery
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcessId
CreateDirectoryW
OpenThread
SuspendThread
VirtualFree
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenProcess
MultiByteToWideChar
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileSizeEx
FindNextFileW
FindFirstFileW
FindClose
CreateFileW
DeleteFileW
CreateThread
WaitForSingleObject
GetProcAddress
SetLastError
WideCharToMultiByte
FileTimeToDosDateTime
CloseHandle
GetTempFileNameA
GetFileAttributesW
TerminateProcess
ResumeThread
Sleep
GetTempPathA
WriteFile
SetFilePointer
ReadFile
GetFileInformationByHandle
FileTimeToLocalFileTime
DeleteFileA
CreateFileA
LoadLibraryW
GetCurrentProcess
GetLastError
GetCommandLineW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetProcessHeap
GetThreadDesktop
GetWindowThreadProcessId
LoadImageW
DefWindowProcW
PostQuitMessage
GetMessageW
TranslateMessage
DispatchMessageW
GetDC
CreateWindowExW
RegisterClassExW
UnregisterClassW
SendMessageW
FindWindowW
GetDesktopWindow
MessageBoxW
GetProcessWindowStation
GetUserObjectInformationW
SetPixelFormat
SwapBuffers
ChoosePixelFormat
RegEnumValueW
RegOpenKeyW
RegEnumKeyExW
CreateProcessAsUserW
CreateProcessWithLogonW
RegCopyTreeW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegCreateKeyW
RegQueryValueExW
RegFlushKey
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
ShellExecuteExW
SHCreateItemFromParsingName
StringFromGUID2
CoCreateGuid
IIDFromString
CoTaskMemFree
CoGetObject
CoInitialize
StringFromCLSID
CLSIDFromString
CoCreateInstance
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayDestroy
SysFreeString
SysAllocString
memset
__vcrt_LoadLibraryExW
memchr
__C_specific_handler
memcpy
memcmp
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
_wsplitpath_s
_wmakepath_s
__stdio_common_vsprintf_s
strcat_s
strcpy_s
_CrtDbgReportW
_CrtDbgReport
wcscpy_s
RtlInitUnicodeString
RtlEncodePointer
RtlDecodePointer
NtOpenKey
NtTerminateProcess
NtSuspendProcess
NtResumeProcess
NtSetValueKey
RtlFreeSid
RtlAllocateAndInitializeSid
RtlLengthSid
RtlNtStatusToDosError
RtlSetLastWin32Error
NtOpenProcessToken
NtSetEvent
NtCreateEvent
NtQueryInformationToken
NtSetInformationToken
NtOpenProcess
NtSetInformationThread
NtDeleteFile
LdrAccessResource
LdrFindResource_U
LdrGetProcedureAddress
RtlInitString
RtlPrefixUnicodeString
RtlExpandEnvironmentStrings_U
RtlFormatCurrentUserKeyPath
LdrEnumerateLoadedModules
RtlAllocateHeap
RtlFreeHeap
RtlImageDirectoryEntryToData
RtlEnterCriticalSection
RtlLeaveCriticalSection
NtQuerySystemInformation
NtCreateDirectoryObject
NtFsControlFile
NtReadFile
NtQueryInformationFile
NtQueryValueKey
NtQueryInformationProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlDosPathNameToNtPathName_U
RtlFreeUnicodeString
NtFreeVirtualMemory
NtAllocateVirtualMemory
RtlDecompressBuffer
RtlQueryElevationFlags
RtlCreateHeap
RtlGetVersion
RtlGetFrame
RtlPopFrame
RtlPushFrame
RtlImageNtHeader
LdrGetDllHandle
NtNotifyChangeDirectoryFile
NtCreateFile
NtWaitForSingleObject
RtlGetCurrentPeb
NtClose
NtFilterToken
NtDuplicateToken
SdbCloseDatabaseWrite
SdbBeginWriteListTag
SdbWriteStringTag
SdbEndWriteListTag
SdbWriteBinaryTag
SdbWriteDWORDTag
SdbCreateDatabase
glDrawPixels
glDrawBuffer
glColor4i
glLoadIdentity
glMatrixMode
glReadPixels
glVertex2i
glBegin
wglCreateContext
glEnd
glClear
wglMakeCurrent
ord17
ord13
ord11
ord10
ord14
ApplyDeltaB
GetDeltaInfoB
DeltaFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ