Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
OneNote.exe
Resource
win7-20240220-en
Target
1.zip
Size
698KB
MD5
258b7b479023ec3c9a68543d1d73768f
SHA1
c51c4617f431a11762d42362b3bb9064028886df
SHA256
63ec8cabad735d5bf5ed29c2ee17642b511d87d38f812606328fcfa8fb939803
SHA512
669e14ff5f621754899e6d417e6862fdc026576cc73cbf5bc1198c173f163ad8bf58f12d70b88aeb63bd3611051f47728998a5647ef25469312deaba7586a098
SSDEEP
12288:5M6xSufIrp7rWU7a3UMffDwx6uz0pmeP6/V8GylEOpHpm8H6aKqJdeAq:5M6xdfKHW+UUM3vQWQnylEOpUj6j4
resource | yara_rule |
---|---|
static1/unpack001/OneNote.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/OneNote.exe |
unpack002/out.upx |
unpack001/WerFault.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\1\s\exe\x64\Release\TcpView64.pdb
CreateThread
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetTickCount64
FileTimeToSystemTime
SetFilePointerEx
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleCP
ExitProcess
lstrcmpiW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
LCMapStringEx
AcquireSRWLockShared
AcquireSRWLockExclusive
ReleaseSRWLockShared
ReleaseSRWLockExclusive
GetStringTypeW
LoadLibraryExA
VirtualFree
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
OutputDebugStringW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
QueryFullProcessImageNameW
OpenProcess
DecodePointer
VerifyVersionInfoW
lstrcmpW
VirtualQuery
SetPriorityClass
SetThreadPriority
GetCurrentThread
CreateDirectoryW
VerSetConditionMask
GetNumberFormatEx
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
FormatMessageW
GetModuleHandleExW
GetModuleFileNameA
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
TrySubmitThreadpoolCallback
VirtualAlloc
lstrlenW
MulDiv
LoadLibraryW
FreeLibrary
GetThreadId
CloseHandle
GetTempPathW
WriteFile
GetTempFileNameW
DeleteFileW
CreateFileW
GetModuleFileNameW
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
TerminateProcess
EnterCriticalSection
GetLastError
WritePrivateProfileStructW
GetPrivateProfileStructW
WriteConsoleW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetFileAttributesW
GetCurrentProcess
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
RaiseException
GlobalLock
GlobalUnlock
GlobalAlloc
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleW
GetFileType
GetCommandLineW
GetStdHandle
LoadLibraryExW
GetVersionExW
RtlUnwind
SetLastError
AppendMenuW
GetMenuItemID
GetSubMenu
CreatePopupMenu
LoadMenuW
LoadAcceleratorsW
GetKeyState
CharNextW
CharLowerW
PostQuitMessage
GetMessagePos
PeekMessageW
DispatchMessageW
RemoveMenu
GetMessageW
DrawFrameControl
SetRectEmpty
RegisterWindowMessageW
LoadStringA
LoadIconW
EnableWindow
MonitorFromPoint
MessageBoxW
LockWindowUpdate
GetMenuItemInfoW
TrackPopupMenuEx
ModifyMenuW
GetMenuItemCount
GetMenuInfo
SetMenuDefaultItem
MessageBeep
GetCursorPos
TranslateMessage
WindowFromPoint
GetWindowThreadProcessId
SendMessageW
DialogBoxIndirectParamW
EndDialog
GetDlgItem
SetWindowTextW
SetCursor
CheckMenuRadioItem
DrawEdge
SetMenuInfo
GetMenuStringW
SetMenu
GetMenu
TranslateAcceleratorW
GetActiveWindow
GetDlgCtrlID
DialogBoxParamW
CreateDialogParamW
SetWindowPlacement
GetWindowPlacement
DestroyWindow
GetSysColorBrush
InflateRect
LoadCursorW
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
DestroyMenu
SetMenuItemInfoW
GetSysColor
LoadImageW
IsMenu
IsWindow
LoadStringW
GetWindow
MapWindowPoints
GetWindowRect
SetDlgItemTextW
GetAncestor
DrawIconEx
DefWindowProcW
CallWindowProcW
UnregisterClassW
RegisterClassExW
GetClientRect
GetClassInfoExW
CreateWindowExW
SetFocus
GetFocus
SetTimer
KillTimer
DrawTextW
BeginPaint
EndPaint
InvalidateRect
GetWindowTextW
GetWindowModuleFileNameW
GetMonitorInfoW
MonitorFromWindow
SystemParametersInfoW
GetScrollInfo
SetScrollInfo
DestroyIcon
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassNameW
SetClassLongPtrW
SetWindowLongW
GetWindowLongW
PtInRect
OffsetRect
CopyRect
FrameRect
FillRect
DrawFocusRect
ScreenToClient
ShowScrollBar
SetScrollPos
RedrawWindow
ReleaseDC
GetWindowDC
GetDC
UpdateWindow
GetSystemMetrics
IsWindowEnabled
IsZoomed
IsWindowVisible
SetWindowPos
MoveWindow
ShowWindow
IsChild
PostMessageW
GetParent
SetWindowLongPtrW
GetWindowLongPtrW
GetWindowTextLengthW
ExcludeClipRect
CreatePatternBrush
PatBlt
SetBrushOrgEx
CreateBitmap
CreateDIBSection
GetCurrentObject
Polyline
TextOutW
MoveToEx
SetTextAlign
Rectangle
GetDeviceCaps
SetMapMode
StartDocW
EndDoc
StartPage
EndPage
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
SetBkColor
ExtTextOutW
CreateFontIndirectW
SetBkMode
SetTextColor
GetObjectW
CreateSolidBrush
CreatePen
GetStockObject
LineTo
GetTextExtentPoint32W
ChooseFontW
GetSaveFileNameW
GetOpenFileNameW
PrintDlgW
ControlTraceW
RegCreateKeyW
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegGetValueW
OpenProcessToken
GetTokenInformation
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
ProcessTrace
OpenTraceW
RegCloseKey
StartTraceW
RegQueryInfoKeyW
RegEnumKeyExW
SHGetFolderPathW
ShellExecuteW
ExtractIconExW
ExtractIconW
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
VarUI4FromStr
ImageList_Destroy
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Create
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_DrawIndirect
CreateStatusWindowW
InitCommonControlsEx
ImageList_Draw
SetWindowTheme
IsThemeActive
IsAppThemed
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
DwmSetWindowAttribute
DwmDefWindowProc
GetOwnerModuleFromTcpEntry
GetExtendedUdpTable
GetOwnerModuleFromUdpEntry
GetOwnerModuleFromTcp6Entry
GetOwnerModuleFromUdp6Entry
SetTcpEntry
GetExtendedTcpTable
WSAGetLastError
getservbyport
getaddrinfo
send
recv
htons
connect
closesocket
ntohs
freeaddrinfo
GetNameInfoW
WSAStartup
gethostname
socket
TdhGetEventInformation
TdhGetPropertySize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFilePointer
GetFileInformationByHandle
GetTempPathA
CreateFileA
DeleteFileA
FileTimeToLocalFileTime
WideCharToMultiByte
GetTempFileNameA
FileTimeToDosDateTime
HeapCreate
HeapAlloc
HeapDestroy
CreateDirectoryW
TerminateProcess
RemoveDirectoryW
CreateFileW
ResumeThread
DeleteFileW
CreateProcessW
ReadFile
GetFileAttributesW
LoadLibraryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetStartupInfoW
WaitForDebugEvent
InitializeProcThreadAttributeList
ContinueDebugEvent
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
TerminateThread
CreateThread
SetThreadPriority
VirtualFree
GetCurrentProcess
LocalAlloc
GetCurrentThreadId
SetEvent
LocalFree
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteFile
ExitProcess
GetCommandLineW
LoadLibraryExW
FreeLibrary
GetModuleHandleW
Sleep
CloseHandle
GetLastError
CreateEventW
WaitForSingleObject
SetLastError
GetModuleFileNameW
CopyFileW
VirtualAlloc
VirtualQuery
CharPrevW
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutW
GetThreadDesktop
RegSetKeyValueW
CreateWellKnownSid
RegFlushKey
RegEnumKeyExW
RegOpenKeyW
CreateProcessAsUserW
RegDeleteKeyW
RegCreateKeyW
RegCloseKey
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
RegSetValueExW
StartServiceW
RegOpenKeyExW
RegDeleteValueW
OpenServiceW
QueryServiceStatusEx
ShellExecuteExW
SHAssocEnumHandlersForProtocolByApplication
SHCreateItemFromParsingName
SHGetSpecialFolderPathW
SHGetKnownFolderPath
CoInitializeEx
CoUninitialize
StringFromCLSID
CoCreateGuid
CoCreateInstance
CoTaskMemFree
CoGetObject
CLSIDFromString
VariantInit
SysAllocString
SysFreeString
RpcRaiseException
RpcStringFreeW
RpcAsyncInitializeHandle
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcAsyncCompleteCall
RpcBindingFree
RpcBindingSetAuthInfoExW
NdrAsyncClientCall
NtClose
NtCreateEvent
NtUnmapViewOfSection
NtMapViewOfSection
NtDeleteFile
RtlAppendUnicodeStringToString
RtlAppendUnicodeToString
NtOpenKey
RtlFormatCurrentUserKeyPath
NtCreateKey
NtSetValueKey
NtOpenProcessToken
NtDuplicateToken
NtRemoveProcessDebug
NtSetInformationToken
RtlAllocateAndInitializeSid
RtlLengthSid
NtDuplicateObject
RtlFreeSid
DbgUiSetThreadDebugObject
NtTerminateProcess
RtlFreeUnicodeString
RtlDosPathNameToNtPathName_U
NtSetEvent
NtCreateFile
RtlInitUnicodeString
NtNotifyChangeDirectoryFile
RtlGetFrame
RtlPopFrame
RtlPushFrame
NtDeleteKey
RtlRandomEx
RtlInitializeSid
RtlDestroyHeap
RtlAllocateHeap
NtQuerySystemInformation
RtlSubAuthoritySid
NtWaitForSingleObject
LdrGetDllHandle
NtQueryInformationProcess
RtlDeleteBoundaryDescriptor
NtOpenProcess
LdrFindResource_U
NtQueryInformationToken
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
RtlPrefixUnicodeString
NtDeleteValueKey
RtlLengthRequiredSid
RtlAcquirePebLock
RtlImageNtHeader
RtlGetVersion
RtlWow64EnableFsRedirectionEx
NtFsControlFile
RtlGetCurrentPeb
NtCreatePrivateNamespace
NtDeletePrivateNamespace
RtlFreeHeap
RtlRaiseStatus
RtlSetHeapInformation
RtlCreateHeap
LdrFindEntryForAddress
RtlNtStatusToDosError
RtlAddSIDToBoundaryDescriptor
RtlReleasePebLock
RtlExpandEnvironmentStrings_U
NtQueryValueKey
LdrAccessResource
RtlUnwind
RtlEqualUnicodeString
NtCreateSection
RtlComputeCrc32
RtlQueryElevationFlags
LdrGetDllHandleEx
NtCompressKey
RtlExitUserProcess
RtlImageDirectoryEntryToData
NtFreeVirtualMemory
RtlCreateBoundaryDescriptor
ord17
ord10
ord14
ord11
ord13
DeltaFree
ApplyDeltaB
BCryptDestroyKey
BCryptCloseAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptGetProperty
BCryptOpenAlgorithmProvider
BCryptDecrypt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ