Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
5982654.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5982654.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
5982654.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
5982654.exe
Resource
win11-20240214-en
Target
5982654.exe
Size
128KB
MD5
231ce1e1d7d98b44371ffff407d68b59
SHA1
25510d0f6353dbf0c9f72fc880de7585e34b28ff
SHA256
30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96
SHA512
520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612
SSDEEP
3072:zar2xXibKcf5K67+k02XbFbosspwUUgcR:Nibl7+k02XZb9UA
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
easinvoker.pdb
TraceMessage
RegGetValueW
OpenProcessToken
OpenThreadToken
GetTokenInformation
MakeAbsoluteSD
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
GetTraceEnableFlags
GetTraceLoggerHandle
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
GetLengthSid
CopySid
CreateWellKnownSid
GetSecurityDescriptorDacl
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueW
PrivilegeCheck
CheckTokenMembership
RegSetValueExW
EventUnregister
EventRegister
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
TerminateProcess
LocalAlloc
FreeLibrary
LoadLibraryExW
GetProcAddress
CreateFileW
GetSystemWindowsDirectoryW
HeapAlloc
HeapFree
GetProcessHeap
GetComputerNameExW
LocalFree
CloseHandle
CreateEventW
GetLastError
GetCurrentThread
SetEvent
WaitForSingleObject
GetCurrentProcess
GetVersionExW
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
_vsnwprintf
_XcptFilter
_amsg_exit
_wcsnicmp
_wcsicmp
memcpy
_purecall
_wtoi
__wgetmainargs
__set_app_type
exit
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
memset
RtlSubAuthorityCountSid
NtOpenProcessToken
RtlCopySid
RtlLengthSid
RtlGetNtProductType
RtlInitUnicodeString
RtlSubAuthoritySid
RtlInitializeSid
RtlDeleteResource
RtlReleaseResource
RtlAcquireResourceExclusive
RtlEqualSid
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
NtDuplicateToken
NtQueryInformationToken
NtQuerySystemInformation
NtGetCachedSigningLevel
RtlInitializeResource
NtOpenThreadToken
NtClose
CoReleaseServerProcess
CoInitializeSecurity
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoInitializeEx
CoUninitialize
CoAddRefServerProcess
SystemParametersInfoW
UpdatePerUserSystemParameters
RpcBindingCreateW
RpcBindingBind
I_RpcExceptionFilter
RpcSsDestroyClientContext
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcStringFreeW
NdrClientCall3
I_RpcMapWin32Status
SamFreeMemory
SamConnect
SamOpenDomain
SamCloseHandle
SamQuerySecurityObject
SamQueryInformationUser
SamOpenUser
SamQueryInformationDomain
WinBioGetLogonSetting
WinBioGetEnabledSetting
WinBioRemoveAllCredentials
WinBioGetDomainLogonSetting
NetUserGetInfo
NetApiBufferFree
AuthzFreeContext
AuthzAccessCheck
AuthzAddSidsToContext
AuthzInitializeContextFromSid
AuthzInitializeResourceManager
AuthzFreeResourceManager
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ