Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
6cface5d66ad3161092f27ae87d4f3e58452c9b71b2a7b66c0f6f673e592f0ae.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6cface5d66ad3161092f27ae87d4f3e58452c9b71b2a7b66c0f6f673e592f0ae.exe
Resource
win10v2004-20240412-en
Target
6cface5d66ad3161092f27ae87d4f3e58452c9b71b2a7b66c0f6f673e592f0ae
Size
834KB
MD5
7cba88c4261c8a43021b3d559a51f8b4
SHA1
5fab8515652fa3626ee76a2d7f7c61922a8704e9
SHA256
6cface5d66ad3161092f27ae87d4f3e58452c9b71b2a7b66c0f6f673e592f0ae
SHA512
9d50d574bebac39e98381a106f04d10199219e7fdeb978e483f6bc547885ed82d8d1eb915ce8cc7db0c843d21999be1e806f8c0144411288c74b54ecbcf635a6
SSDEEP
12288:bxXC0jg3yO54wQDWolnQ6tdFwyDMsdw1VFvd1TsKfwsnnQ9d:M0jgcv1TtsyDHi1VFvd1TvIsnnQ9d
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\vmagent_new\bin\joblist\649637\out\Release\ScriptExecute.pdb
SetFileAttributesW
GetFileAttributesExW
GetModuleFileNameA
SetLastError
GetTickCount
QueryPerformanceCounter
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
lstrlenA
GetDiskFreeSpaceExW
CreateDirectoryW
SystemTimeToFileTime
ReadFile
ExpandEnvironmentStringsW
lstrcmpiW
GetPrivateProfileStringW
CopyFileW
TerminateProcess
InterlockedIncrement
InterlockedDecrement
GetWindowsDirectoryW
GetCurrentThread
VirtualAlloc
VirtualQuery
ResumeThread
GetThreadContext
SuspendThread
OpenThread
SetThreadPriority
GetThreadPriority
FlushInstructionCache
VirtualProtect
lstrcpyW
GetTempPathW
SetErrorMode
WaitForMultipleObjects
SetEvent
OpenEventW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcessHeap
HeapAlloc
HeapFree
UnmapViewOfFile
CreateEventW
MapViewOfFile
GetShortPathNameW
GetTempFileNameW
GetCurrentDirectoryW
SetVolumeLabelW
GetDriveTypeW
SetFileTime
GetFileAttributesW
LocalAlloc
GetCurrentThreadId
GetLocalTime
SetFilePointer
GetFileSizeEx
MoveFileW
WriteFile
DeleteCriticalSection
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcessId
Process32NextW
GetLastError
OpenProcess
CreateMutexW
DeviceIoControl
InitializeCriticalSection
GetCommandLineW
GetPrivateProfileIntW
InterlockedExchange
LocalFree
InterlockedCompareExchange
Sleep
lstrlenW
GetVersionExW
FreeResource
GetSystemWindowsDirectoryW
GetCurrentProcess
GetModuleHandleA
GetSystemInfo
DeleteFileW
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LoadLibraryExW
CloseHandle
LoadLibraryW
WaitForSingleObject
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetSystemDirectoryW
GetModuleHandleW
GetProcAddress
GetModuleFileNameW
FindFirstFileW
FindNextFileW
FindClose
lstrcmpiA
lstrcmpA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetStartupInfoA
SetHandleCount
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapCreate
VirtualFree
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
GetStdHandle
GetFileType
WriteConsoleW
GetDateFormatA
GetTimeFormatA
CreateThread
ExitThread
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MultiByteToWideChar
RtlUnwind
TlsFree
TlsAlloc
CreateFileW
CreateFileMappingW
RaiseException
HeapDestroy
HeapReAlloc
HeapSize
CreateFileA
GetSystemTimeAsFileTime
LocalFileTimeToFileTime
SetEndOfFile
SetFilePointerEx
TlsGetValue
OutputDebugStringW
TlsSetValue
HeapUnlock
HeapLock
HeapWalk
ReleaseMutex
SetForegroundWindow
MessageBoxW
FindWindowW
IsIconic
IsWindowVisible
ShowWindow
BringWindowToTop
GetActiveWindow
ExitWindowsEx
SetSecurityDescriptorDacl
RegEnumKeyExA
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegOpenKeyW
RegCreateKeyW
GetFileSecurityW
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetLengthSid
InitializeAcl
EqualSid
AddAce
AddAccessAllowedAce
GetSecurityDescriptorControl
SetFileSecurityW
StartServiceW
DeleteService
CreateServiceW
ChangeServiceConfig2W
LockServiceDatabase
QueryServiceLockStatusW
UnlockServiceDatabase
ChangeServiceConfigW
ControlService
QueryServiceStatus
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
GetAclInformation
GetAce
GetUserNameW
GetNamedSecurityInfoW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetNamedSecurityInfoW
GetExplicitEntriesFromAclW
DeleteAce
LookupAccountNameW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExA
RegOpenKeyExA
CommandLineToArgvW
SHGetSpecialFolderPathW
ord165
ShellExecuteW
SHCreateDirectoryExW
SHFileOperationW
PathIsRelativeW
PathIsDirectoryW
SHDeleteKeyW
PathIsRootW
SHSetValueW
SHDeleteValueW
PathStripPathW
SHGetValueW
PathFileExistsW
PathAppendW
StrFormatByteSizeW
PathCombineW
StrStrIW
PathRemoveFileSpecW
StrStrIA
SHSetValueA
PathFindFileNameW
SHGetValueA
WTSFreeMemory
WTSQuerySessionInformationW
EnumProcessModules
GetModuleFileNameExW
SetupIterateCabinetW
URLDownloadToFileW
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE