Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ev0ga.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ev0ga.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
heh.cmd
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
heh.cmd
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
hsbca.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
hsbca.exe
Resource
win10v2004-20231215-en
Target
bf88b75e73d51b0bbad6ebd27b5b35f1
Size
273KB
MD5
bf88b75e73d51b0bbad6ebd27b5b35f1
SHA1
504b0e5036f958ed4e3b559ef7f41a41f572d653
SHA256
c0c5d039748e8802e2514e0f27882ec795952acbb8247cf1d0651aa59b5030f4
SHA512
fd73c31adf33f4dddb11ea51eb6ad65420036422073a2a1aac328f2055ec918d8527db13b9a2b87910a3d6722f6780a7eaada95e435cc6a1bbce7b84bf25ef8f
SSDEEP
6144:NubbaPjNn340lxz3gDNH3/UD8VIRmVLbe1:N0baPpI0/zwF3c8te
Checks for missing Authenticode signature.
resource |
---|
unpack001/ev0ga.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
ShowWindow
GetWindowRect
SetWindowPos
BeginPaint
DefWindowProcW
DeleteMenu
CreateRectRgn
CreateFontIndirectA
SafeArrayCreate
SysAllocString
__getmainargs
_controlfp
_except_handler3
__set_app_type
__p__fmode
strcmp
_exit
__p__commode
exit
_acmdln
_XcptFilter
_initterm
__setusermatherr
_adjust_fdiv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
SetPriorityClass
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GetPriorityClass
Sleep
GetVersionExW
GetExitCodeProcess
lstrcpynW
ExitProcess
GetModuleFileNameW
CompareStringW
SetCurrentDirectoryW
lstrcmpiW
CloseHandle
LocalFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
lstrcpyW
LocalAlloc
LocalLock
TerminateProcess
GetFileAttributesW
lstrlenW
WaitForInputIdle
MessageBoxW
GetTokenInformation
OpenProcessToken
ShellExecuteExW
CommandLineToArgvW
CoCreateInstance
CoInitializeEx
CoUninitialize
SysAllocString
SysFreeString
ord176
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ