Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
d3664b62fd02bb44e29bbab0f2c6d91e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3664b62fd02bb44e29bbab0f2c6d91e.exe
Resource
win10v2004-20240226-en
Target
d3664b62fd02bb44e29bbab0f2c6d91e
Size
870KB
MD5
d3664b62fd02bb44e29bbab0f2c6d91e
SHA1
b65f4d7262dc4aa5fe914f2732631f04af61ba6f
SHA256
fa9814f79a0c1b2aeb19548b573726ae30e60a3344a4221c5e1486dcc375b3b1
SHA512
0a931fdde17983d4312c882bd8b547d0604d8e264b3404ce6f899c0c3de4e81e3b19342512b5d86e257e8d58743a1b7b9bcd8dd36b1638dd6637f93c7446abc0
SSDEEP
12288:6Dz0OqBLsToflY7+6fS8sxIxR14o4feSKv6gQuT:6U9LsTodY7084leBCgQO
resource | yara_rule |
---|---|
sample | family_neshta |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\workarea\13.351.1007\apps\ccc2\Source\Utilities\CliStart\build\amd64\B_rel\CLIStart.pdb
EnumProcesses
CreateEventA
SetEvent
GetTickCount
GlobalAddAtomA
GlobalDeleteAtom
SetLastError
FindFirstFileW
GetLocaleInfoW
LoadLibraryW
GetACP
ReadConsoleW
ReadFile
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetTimeZoneInformation
SetFilePointerEx
GetConsoleMode
GetLastError
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
HeapReAlloc
OutputDebugStringW
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateProcessW
GetTickCount64
CloseHandle
QueryFullProcessImageNameA
OpenProcess
GetVersionExA
Sleep
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileW
GetConsoleCP
EncodePointer
QueryPerformanceCounter
GetModuleFileNameA
DeleteCriticalSection
GetFileType
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
HeapAlloc
HeapFree
SetEnvironmentVariableA
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileExW
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineA
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
RaiseException
GetCurrentThreadId
RtlPcToFileHeader
HeapSize
RtlUnwindEx
IsValidCodePage
GetOEMCP
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
wsprintfA
SetTimer
LoadStringW
DestroyMenu
TrackPopupMenu
SetMenuDefaultItem
InsertMenuW
GetCursorPos
CreatePopupMenu
SetForegroundWindow
LoadImageW
UnregisterHotKey
RegisterHotKey
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DefWindowProcA
SendMessageA
PostQuitMessage
IsWindow
FindWindowW
MessageBoxExA
DestroyWindow
KillTimer
DispatchMessageA
GetMessageA
RegSetValueExW
RegDeleteValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumValueW
RegQueryValueExW
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExW
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExW
SHGetSpecialFolderLocation
SHBindToParent
Shell_NotifyIconW
SHGetMalloc
CoInitialize
CoUninitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ