Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Magic Bullet Suite Installer.exe
Resource
win10-20231215-en
Target
Magic Bullet Suite Installer.exe
Size
2.8MB
MD5
5e9a15c9180b2187d076993250dcc459
SHA1
3caf139ed1ffaa41ebe2dc7ecbf69a0b56702181
SHA256
ebe14f82040a113ca0b98f729fc91304255c911014a0a9e2bb14d865c5de3e9b
SHA512
8e26a6b854c1b17aaf90abc599499f53e787ac5eb0f6d8b7935543de61a29c691acbf93e5c24cf7fe21bfa7930ac02e90a0e199756d262f679551efe3154c968
SSDEEP
49152:zZ5CI8iznk8UDgnb76wjnZwTT88nKmOmPch6N3XAdmlerbvNEmZuBmi1:zyU7f1sxOmP86NgdmlerbVEyuBmy
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\rg\ws\mb_suite\stage\Magic Bullet Suite Installer.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
CreateDirectoryW
CreateFileW
LocalFree
CreateProcessW
GetCurrentProcess
FreeLibrary
GetProcAddress
lstrcmpiW
FindResourceW
LoadLibraryExW
GetModuleFileNameW
GetCommandLineW
CreateMutexA
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FindClose
FindFirstFileA
FindNextFileA
OutputDebugStringA
lstrcpyA
lstrcatA
lstrlenA
DeviceIoControl
SetFilePointerEx
SetEndOfFile
GetFullPathNameW
GetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
SetLastError
GetCurrentDirectoryW
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
GetUserDefaultLocaleName
InitializeCriticalSectionAndSpinCount
GetCPInfo
CompareStringEx
GetStringTypeW
GetLocaleInfoEx
GetSystemTimeAsFileTime
VerSetConditionMask
VerifyVersionInfoW
GetModuleHandleW
GetCurrentThreadId
LoadResource
LockResource
FreeResource
GetSystemDefaultLocaleName
GetModuleHandleA
GetCurrentDirectoryA
DeleteFileW
FindResourceA
SizeofResource
GetModuleFileNameA
SetEvent
CreateEventA
QueryPerformanceCounter
CreateProcessA
QueryPerformanceFrequency
WaitForSingleObject
GetEnvironmentVariableA
CreatePipe
SetHandleInformation
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateFileA
Sleep
WriteFile
WaitNamedPipeA
SetNamedPipeHandleState
ReadFile
RemoveDirectoryA
RtlUnwind
MultiByteToWideChar
WideCharToMultiByte
K32GetModuleFileNameExA
K32EnumProcessModules
K32EnumProcesses
CloseHandle
GetExitCodeProcess
OpenProcess
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapSize
InitializeCriticalSectionEx
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapFree
WriteConsoleW
CreateDirectoryExW
CopyFileW
ResetEvent
LCMapStringEx
GetExitCodeThread
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileSizeEx
GetConsoleOutputCP
GetStdHandle
GetTimeZoneInformation
ExitProcess
DuplicateHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
ReadConsoleW
GetConsoleMode
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
RtlPcToFileHeader
WaitForSingleObjectEx
RtlUnwindEx
ResumeThread
ReleaseSemaphore
OpenEventA
AreFileApisANSI
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
FormatMessageA
MoveFileExW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
SetTimer
EnableWindow
MessageBeep
MessageBoxA
LoadCursorW
GetClassInfoExW
RegisterClassExW
GetActiveWindow
GetWindowLongW
UnregisterClassW
GetMonitorInfoW
GetParent
MapWindowPoints
SetWindowPos
SendMessageA
RedrawWindow
CreateWindowExW
ShowWindow
GetWindow
GetTopWindow
MoveWindow
KillTimer
GetWindowRect
PostQuitMessage
DestroyWindow
LoadIconW
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
DefWindowProcW
EndPaint
BeginPaint
SetRect
LoadBitmapW
SendMessageW
FillRect
DrawTextA
CopyRect
IsWindowEnabled
InvalidateRect
GetClientRect
SendMessageTimeoutA
MonitorFromWindow
CreateFontIndirectA
CreateSolidBrush
GetObjectW
BitBlt
DeleteObject
CreateCompatibleDC
SetBkColor
SetTextColor
SelectObject
SetBkMode
DeleteDC
GetSaveFileNameW
GetOpenFileNameW
GetSecurityInfo
OpenProcessToken
GetTokenInformation
RegCreateKeyExA
RegOpenKeyExA
RegGetValueA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
FreeSid
SetSecurityInfo
SetEntriesInAclW
AllocateAndInitializeSid
CloseServiceHandle
OpenServiceA
OpenSCManagerW
GetUserNameA
RegSetKeyValueA
ShellExecuteA
SHGetFolderPathA
CommandLineToArgvW
OleInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
OleUninitialize
CoTaskMemFree
VarUI4FromStr
InitCommonControlsEx
GdipDeleteGraphics
GdipClosePathFigure
GdipResetPath
GdipDeletePath
GdipCreatePath
GdipSetPenMode
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdipCreateFromHDC
GdipSetSmoothingMode
GdipSetPageUnit
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdiplusStartup
GdiplusShutdown
GdipAddPathArcI
GetUserNameExA
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
gethostbyaddr
socket
sendto
inet_addr
htons
closesocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ