Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
8b66a3ecbb30f4351758c45f1c11dfa8faa9804b2976e108e9557ba39bae3202.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b66a3ecbb30f4351758c45f1c11dfa8faa9804b2976e108e9557ba39bae3202.exe
Resource
win10v2004-20231215-en
Target
d8f4ab2a01c5d8ad7ffd4aec3cf93921.bin
Size
1.0MB
MD5
c9dac071257f651d1341032780d0b977
SHA1
ff618bf21d0f5b99ac20613f4b05100e306cdd43
SHA256
56dd2688b98ea14fce49f55d1219303b96bf7f66a6bd757fff26ab396dea1c28
SHA512
8cfe9c0f71d4cd62fd95dc8c7d89021d0d8856be353bed45dffefd6fef1ff43af31a50c02cb22416564e6306a6e398575a6de8794509eaa157e7d9d195b2ad2a
SSDEEP
24576:bE0jay1NrTVD2hUREXQh7hDSzO44L50HsXIPmhW8Ps9gmuDn:Ba8xRD2hUREXQhVDSQL2HsvPygtn
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
SetLastError
SystemTimeToFileTime
GetLocalTime
GetExitCodeThread
CreateThread
Sleep
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileAttributesW
GetTempPathW
MultiByteToWideChar
WideCharToMultiByte
CompareFileTime
FindClose
FindFirstFileW
CreateDirectoryW
ExpandEnvironmentStringsW
lstrlenA
lstrcmpW
GetSystemTimeAsFileTime
RemoveDirectoryW
FindNextFileW
DeleteFileW
GetEnvironmentVariableW
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
lstrcmpiW
LoadLibraryA
SetEnvironmentVariableW
GetModuleFileNameW
GetCommandLineW
GetModuleHandleW
GetTickCount
WriteFile
CreateFileW
GetDriveTypeW
SetFileAttributesW
LockResource
LoadResource
FindResourceA
MulDiv
GetSystemDirectoryW
ResumeThread
TerminateThread
SuspendThread
LocalFree
lstrcpyW
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualAlloc
VirtualFree
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
GetFileInformationByHandle
WaitForMultipleObjects
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
GetLastError
WaitForSingleObject
CloseHandle
GetProcAddress
lstrlenW
GetCurrentThreadId
UnhandledExceptionFilter
ShowWindow
ReleaseDC
DrawTextW
GetDC
ClientToScreen
DialogBoxIndirectParamW
MessageBeep
DrawIconEx
GetWindowDC
CallWindowProcW
DefWindowProcW
LoadIconW
IsWindow
GetWindowLongW
GetSystemMenu
wvsprintfW
GetDlgItem
GetSystemMetrics
GetKeyState
MessageBoxA
SetWindowTextW
GetParent
LoadImageW
GetWindow
SetWindowPos
SystemParametersInfoW
SetFocus
CallNextHookEx
EnableWindow
KillTimer
SendMessageW
EndDialog
wsprintfW
SetWindowLongW
SetWindowsHookExW
SetTimer
GetClientRect
EnableMenuItem
PtInRect
CharUpperW
GetWindowTextW
GetWindowTextLengthW
ScreenToClient
GetWindowRect
UnhookWindowsHookEx
CreateFontIndirectW
SelectObject
GetDeviceCaps
GetObjectW
DeleteObject
SHGetPathFromIDListW
SHGetMalloc
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
SHBrowseForFolderW
CoCreateInstance
CoInitializeEx
VariantClear
SysAllocStringLen
wcsncpy
_wcsnicmp
strncpy
memmove
wcsncmp
memcpy
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
__CxxFrameHandler3
_CxxThrowException
malloc
free
wcsstr
wcscmp
_beginthreadex
_except_handler3
_unlock
__dllonexit
_lock
_onexit
??1type_info@@UAE@XZ
__getmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_controlfp
memset
_wtol
memcmp
??3@YAXPAX@Z
??2@YAPAXI@Z
_purecall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ