Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.TScope.Trojan.Delf.15729.11571.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.TScope.Trojan.Delf.15729.11571.exe
Resource
win10v2004-20231215-en
Target
SecuriteInfo.com.TScope.Trojan.Delf.15729.11571.exe
Size
86KB
MD5
933b5d538f5bd0ef91a24ccbb8447e28
SHA1
92bc5bc11eb5f4143900c648240efbb02acf1d6a
SHA256
eb189dc9c5eebd7dfa2bd6d734a2df4ef6a0a6baa13c0b1b0cd7e88a646d0be3
SHA512
7f09059179b7ea1727e0885c4336f60cea9b20b4acbab5bc6ffd58563697ecbef7020f56e9631974a47d278fdbff51848dd959a5fd4bb66e6b4e1ab4c740ea47
SSDEEP
1536:3dJkC2gcA3aFBYjBPZS40aNEiIImbDPgwxOt:3dJkPeKFOZS+Sxblxa
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
WaitMessage
TranslateMessage
ShowWindow
SetWindowPos
SetParent
SetForegroundWindow
SetFocus
SendMessageA
ReleaseDC
PostQuitMessage
OffsetRect
MessageBoxA
LoadStringA
IsWindowVisible
IsWindowEnabled
IsWindow
InvalidateRect
GetWindowRect
GetSystemMetrics
GetSysColor
GetKeyState
GetFocus
GetDC
GetClientRect
FillRect
DestroyWindow
DestroyIcon
CopyImage
ClientToScreen
CharNextA
CharToOemA
SetWindowLongA
SendMessageA
RegisterClassA
PostMessageA
PeekMessageA
MessageBoxA
LoadIconA
LoadCursorA
GetWindowLongA
GetClassInfoA
DrawTextA
DispatchMessageA
DefWindowProcA
CreateWindowExA
CallWindowProcA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteFile
VirtualQuery
RemoveDirectoryA
LoadLibraryA
GetVersionExA
GetThreadLocale
GetSystemDirectoryA
GetStdHandle
GetShortPathNameA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFileAttributesA
GetDiskFreeSpaceA
GetCPInfo
FreeLibrary
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
DeleteFileA
CreateProcessA
CloseHandle
SetTextColor
SetROP2
SetBrushOrgEx
SetBkMode
SetBkColor
SelectObject
MoveToEx
GetTextExtentPoint32A
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateFontIndirectA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ