Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ruster (1).exe
Resource
win10-20240221-en
Target
ruster (1).exe
Size
1.9MB
MD5
5d5c4c47ccae89a73b6f1f42542c834c
SHA1
5b59fee042ea4897f88a573dbe38ae4cb71e3f7e
SHA256
03cdea5b068f994f8c15ded8e91c32a2638a7f646e68e3988a80e6a377ef6dec
SHA512
dc9ab01fb72f331ff0e7e384db5a43ad41215914c5363d8ab90de7a78ad5d3ef02511585a25189699c1b31d300ff42edd98988660b65da91058dc3fa6f5a786b
SSDEEP
24576:7QOFmaALa3ca3zt9oVgDVVA0fIJZyh/NwRYCtEkFMBVIH06iywuQn652AOafP:7QOFmgL3B9oV6VqLTy5IVuIU6idlO7P
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PostMessageA
FindWindowA
SystemFunction036
GetTokenInformation
OpenProcessToken
GetConsoleOutputCP
CloseHandle
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
TryAcquireSRWLockExclusive
RtlVirtualUnwind
GetCurrentProcess
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryExA
GetProcAddress
FreeLibrary
GetLastError
FormatMessageW
WaitForSingleObject
GetModuleHandleA
GetStdHandle
GetConsoleMode
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
SetLastError
Sleep
GetSystemInfo
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
RtlCaptureContext
RtlLookupFunctionEntry
SetHandleInformation
SleepEx
ReadFileEx
GetEnvironmentStringsW
SetEnvironmentVariableW
DuplicateHandle
GetCurrentProcessId
WriteFileEx
GetFileType
GetFileInformationByHandleEx
CreateThread
SetThreadStackGuarantee
AddVectoredExceptionHandler
FindNextFileW
FindClose
CreateFileW
FlushFileBuffers
GetFileInformationByHandle
SetFilePointerEx
CreateDirectoryW
FindFirstFileW
CopyFileExW
HeapReAlloc
GetCommandLineW
GetSystemTimeAsFileTime
GetTempPathW
CompareStringOrdinal
CreateProcessW
GetFileAttributesW
TerminateProcess
FreeEnvironmentStringsW
GetModuleHandleW
ExitProcess
CreateNamedPipeW
GetFullPathNameW
GetModuleFileNameW
GetWindowsDirectoryW
GetEnvironmentVariableW
GetSystemDirectoryW
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
RtlPcToFileHeader
RaiseException
EncodePointer
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
BCryptGenRandom
select
WSAGetLastError
WSASocketW
ioctlsocket
recv
WSARecv
WSASend
setsockopt
getsockopt
freeaddrinfo
getaddrinfo
send
getpeername
bind
listen
getsockname
closesocket
WSAStartup
WSACleanup
connect
WSADuplicateSocketW
accept
VariantClear
SafeArrayDestroy
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
GetErrorInfo
SysFreeString
SysStringLen
SysAllocStringLen
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
NtWriteFile
RtlNtStatusToDosError
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ