Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
ec_efi.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ec_efi.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
COMPATIBILITY/EFI/BOOT/bootx64.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
COMPATIBILITY/EFI/BOOT/bootx64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
HVCI/EFI/BOOT/bootx64.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
HVCI/EFI/BOOT/bootx64.dll
Resource
win10v2004-20240412-en
Target
ec_efi.zip
Size
71KB
MD5
bfac973057347eae01b6783cfbb7b2db
SHA1
66f211e574446b29f0333f2c8770923c86c34373
SHA256
48340416a009d8a2002e9c89e11e6fd3f1fc0c79cb459a7d47c8d47e05f000c9
SHA512
40fd782c3ae6b62b918090ff36db973c9a9d5d08d72631b2fff6557499982e8f0d07c10db767f0f78d87d853a18d1de827043bec75dab8b31c5e449e86a76947
SSDEEP
768:GqyunCogf6e8iozvvpmACiIC7195HqV952s9zmIoCr/SDUxYG7NVP3W0J8FV4Dyy:Hemz34RiL/052sfz+8jLPmuoyeebE6t
Checks for missing Authenticode signature.
resource |
---|
unpack001/HVCI/EFI/BOOT/bootx64.efi |
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetPhysicalAddress
MmIsAddressValid
PsGetProcessId
PsGetProcessImageFileName
PsGetProcessExitProcessCalled
PsGetProcessPeb
PsGetProcessWow64Process
PsInitialSystemProcess
PsLoadedModuleList
wcsstr
RtlInitUnicodeString
KeLowerIrql
KfRaiseIrql
KeAcquireSpinLockAtDpcLevel
KeReleaseSpinLockFromDpcLevel
IofCompleteRequest
IoReleaseRemoveLockEx
ObfDereferenceObject
NtReadFile
ObQueryNameString
PsGetThreadWin32Thread
ObReferenceObjectByName
IoDriverObjectType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetPhysicalAddress
MmIsAddressValid
PsGetProcessId
PsGetProcessImageFileName
PsGetProcessExitProcessCalled
PsGetProcessPeb
PsGetProcessWow64Process
PsInitialSystemProcess
PsLoadedModuleList
wcsstr
RtlInitUnicodeString
KeLowerIrql
KfRaiseIrql
KeAcquireSpinLockAtDpcLevel
KeReleaseSpinLockFromDpcLevel
IofCompleteRequest
IoReleaseRemoveLockEx
ObfDereferenceObject
NtReadFile
ObQueryNameString
PsGetThreadWin32Thread
ObReferenceObjectByName
IoDriverObjectType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE