Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
gHack-New [26.11.2018].exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
gHack-New [26.11.2018].exe
Resource
win10v2004-20240419-en
Target
gHack-New [26.11.2018].exe
Size
2.8MB
MD5
8b9fa6b8d37a371b83f2477f57034a3d
SHA1
9a76f7923e15b979a571d2e0989d13fe5bca9e55
SHA256
7d466c4e011aeaadc05ea7de69cf62270db96792fe03b9372a05ea9ebd6ad79c
SHA512
beebb7c2bc82b4963cf1b8c3dcd143e31c9b1e0604c571721fccad5e6c80257de0724539f80ccb291b5ab2b29b62de4a8abac4dbb1ac4733da56ea4f6eab001e
SSDEEP
49152:zHEK0NmTb48A0k7SF8ATVAQD3lukvcO4z:Tn0NM4TfAJAw3bvcO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualProtect
IsBadReadPtr
LoadLibraryW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetFilePointer
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
VirtualAlloc
HeapAlloc
WriteFile
RtlUnwind
VirtualFree
GetModuleHandleW
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
CloseHandle
GetLastError
HeapFree
ExitProcess
GetCommandLineA
LCMapStringW
GetStartupInfoA
CopyFileA
GetCommandLineW
GetModuleHandleA
GetProcAddress
GlobalUnlock
GlobalFlags
GetExitCodeProcess
ResetEvent
GetDateFormatA
FindClose
DuplicateHandle
SetCurrentDirectoryA
FindNextFileA
CreateDirectoryA
GlobalLock
RemoveDirectoryA
FindFirstFileA
UnlockFile
ReleaseMutex
GetTimeFormatA
TerminateThread
GetTempPathA
lstrcmpiA
SizeofResource
ResumeThread
CreateMutexW
CreateThread
GetDiskFreeSpaceA
GetVersion
DeleteFileW
FreeLibrary
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapCreate
GetTickCount
wsprintfW
CloseClipboard
CheckDlgButton
TrackPopupMenu
LoadBitmapA
InvalidateRect
CreatePopupMenu
GetKeyState
GetSubMenu
GetWindowLongA
IsWindowVisible
GetWindowLongW
EndPaint
LoadStringW
ClientToScreen
DispatchMessageW
EnableMenuItem
GetParent
CharNextW
GetSystemMenu
LoadMenuW
SetClassLongW
TranslateMessage
GetSysColor
DefWindowProcW
GetClientRect
MoveWindow
SetFocus
DefWindowProcA
DrawTextA
TrackPopupMenuEx
CheckMenuRadioItem
DestroyWindow
SendMessageW
SetWindowLongW
RegisterClassExW
GetSystemMetrics
DeleteMetaFile
DeleteObject
LookupPrivilegeNameW
LookupPrivilegeNameA
RegDeleteKeyW
RegEnumValueW
LookupPrivilegeDisplayNameA
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
InitializeSid
LookupPrivilegeValueW
RegQueryInfoKeyW
RegEnumKeyExW
OpenEventLogW
RegOpenKeyExW
FreeSid
LookupPrivilegeDisplayNameW
IsValidSid
OpenEventLogA
EqualSid
RegSetValueExW
RegQueryValueW
LookupPrivilegeValueA
RegEnumKeyW
RegQueryValueExW
GetSidSubAuthority
LookupAccountSidA
LookupAccountNameW
AllocateAndInitializeSid
RegOpenKeyW
LookupAccountSidW
AllocateLocallyUniqueId
LookupAccountNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ