Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
trojan_4982.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
trojan_4982.exe
Resource
win10v2004-20231215-en
Target
trojan_4982.exe
Size
229KB
MD5
2b6f4fb770a17ff7dc764851fd004982
SHA1
2a4d5365e6adb6a50c9f4b225d3d5abc549b7c9c
SHA256
38b1bbc48c35a5decd8eaf475a5b32f742c28c5d0b5f9c85c1a667fbf2cbdb73
SHA512
42d7f254c5a793bdb4905e2219c9298c56fcca8860dc74388db2460e983b3e21251a2e82d1edc47ce12e0f34bb31f26eacd44fa07e951a326659c44c0715bd06
SSDEEP
6144:WSo+/0gGQMQMCToekerOlLmIRzgFjKIvqWqRG6byc:WSopQM+kXLmI+Fvqq1c
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
OutputDebugStringW
GetProcessHeap
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
HeapDestroy
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
RaiseException
GetLastError
HeapSize
EnterCriticalSection
LocalAlloc
LockResource
DecodePointer
DeleteCriticalSection
CloseHandle
DebugBreak
LocalFree
HeapFree
WriteFile
Sleep
ReadFile
CreateFileW
lstrcpyA
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
SetLastError
GetProcAddress
DeleteFileW
SetFileAttributesW
GetVersionExW
FlushFileBuffers
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
LoadLibraryExW
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
HeapAlloc
LoadResource
FindResourceW
FindResourceExW
lstrlenA
GetFileSize
HeapReAlloc
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCurrentThreadId
SetEnvironmentVariableA
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
CompareStringW
GetStartupInfoW
IsDebuggerPresent
EncodePointer
GetStringTypeW
GetSystemTimeAsFileTime
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
IsProcessorFeaturePresent
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineW
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CharNextW
MessageBoxW
LoadStringW
CharLowerW
LoadIconW
RegQueryValueExW
RegCloseKey
ConvertSidToStringSidW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
SHGetFolderPathW
CoUninitialize
CoInitialize
CoCreateInstance
StrToIntW
StrDupW
StrCatW
PathQuoteSpacesW
StrCpyW
PathFileExistsW
wnsprintfW
WSAResetEvent
WSASetLastError
WSAEnumNetworkEvents
WSACreateEvent
freeaddrinfo
WSAGetOverlappedResult
WSACleanup
WSAEventSelect
WSAConnect
WSAGetLastError
WSASend
WSASocketW
WSARecv
getaddrinfo
WSAStartup
WSASetEvent
WSACloseEvent
closesocket
UuidCreateSequential
UrlMkGetSessionOption
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ