Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
8616e2dc528af387a3a312b31d7b7a39868597fc0c9bd0df24e16306ccd74890.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8616e2dc528af387a3a312b31d7b7a39868597fc0c9bd0df24e16306ccd74890.exe
Resource
win10v2004-20240419-en
Target
8616e2dc528af387a3a312b31d7b7a39868597fc0c9bd0df24e16306ccd74890
Size
958KB
MD5
7d17b2aa0fec1c31f3c2ac4116b14df2
SHA1
b7e7467b5ee583db98211e546bca0f8ed0b599a5
SHA256
8616e2dc528af387a3a312b31d7b7a39868597fc0c9bd0df24e16306ccd74890
SHA512
eb139af12d01acf55d49af3d4cf0b1a5b774169fd02588c9420164d76e417ce3f1b7fe0380a4d42073234b006ba9e963463f75d92da541f6d0aed38837f1d492
SSDEEP
24576:bbl8MY1hrvEeJ5jicEN78fYlTxAtuMTix:1FYfzE27ENQw74u0ix
metasploit
encoder/shikata_ga_nai
metasploit
windows/shell_reverse_tcp
192.168.30.202:5555
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
c:\jenkins\workspace\prs_lxclient\prs_windows\installer-windows\src\main\build\win\release\LxMainNew.pdb
UnregisterWait
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
GetLocaleInfoW
GetUserDefaultLangID
GetSystemDefaultLCID
GetUserDefaultLCID
EnumSystemLocalesW
GetCommandLineW
lstrcmpW
GetModuleHandleW
GetCurrentProcess
HeapDestroy
HeapSize
GetProcessHeap
SizeofResource
LockResource
RegisterWaitForSingleObject
FindResourceW
FindResourceExW
lstrcmpiW
OpenProcess
GetCurrentProcessId
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateProcessW
GetPrivateProfileStringW
GetUserDefaultUILanguage
lstrlenW
FindFirstFileW
FindNextFileW
FindClose
DeleteCriticalSection
RtlUnwind
SetThreadAffinityMask
LocalFree
LoadLibraryW
GetProcAddress
GetModuleFileNameW
FreeLibrary
LoadResource
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
VirtualAllocEx
VirtualFree
GetNativeSystemInfo
GetVersionExW
GetSystemDirectoryW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
TerminateProcess
Sleep
CreateEventW
CreateMutexW
WaitForSingleObjectEx
WaitForSingleObject
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
SetErrorMode
SetLastError
GetLastError
RaiseException
WriteConsoleW
GetStringTypeW
IsValidLocale
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
SetStdHandle
VirtualQuery
RtlCaptureStackBackTrace
FindFirstFileExW
SuspendThread
ResumeThread
DebugBreak
SearchPathW
FlushFileBuffers
SetEndOfFile
TlsSetValue
TlsFree
TlsAlloc
GetConsoleMode
CloseHandle
GetLongPathNameW
GetFileAttributesW
CreateFileW
SetCurrentDirectoryW
GetConsoleOutputCP
GetStdHandle
ExitProcess
IsDebuggerPresent
OutputDebugStringW
GetFileSizeEx
ReadFile
SetFilePointerEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
GetModuleHandleA
HeapSetInformation
GetCurrentThread
VirtualQueryEx
GetCurrentDirectoryW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
CreateIoCompletionPort
CreateThread
GetQueuedCompletionStatus
TerminateJobObject
PostQueuedCompletionStatus
DuplicateHandle
SetInformationJobObject
ProcessIdToSessionId
QueryDosDeviceW
VirtualProtectEx
WriteProcessMemory
VirtualFreeEx
ReadProcessMemory
InitializeCriticalSection
UnregisterWaitEx
GetFileType
SetHandleInformation
AssignProcessToJobObject
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
ExpandEnvironmentStringsW
GetModuleHandleExW
QueryPerformanceFrequency
TlsGetValue
GetExitCodeProcess
CreateNamedPipeW
CreateRemoteThread
CreateJobObjectW
QueryInformationJobObject
CreateDesktopW
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
CloseWindowStation
CloseDesktop
SetProcessWindowStation
GetActiveWindow
MessageBoxW
SetTokenInformation
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
RevertToSelf
RegDisablePredefinedCache
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSidToSidW
GetLengthSid
CreateRestrictedToken
OpenProcessToken
GetAce
SetKernelObjectSecurity
GetKernelObjectSecurity
DuplicateTokenEx
ConvertSidToStringSidW
GetTokenInformation
SystemFunction036
FreeSid
ImpersonateLoggedOnUser
MapGenericMask
GetNamedSecurityInfoW
IsValidSid
EqualSid
AccessCheck
CreateProcessAsUserW
SetThreadToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CommandLineToArgvW
CoInitialize
CoTaskMemFree
SHGetValueW
PathRemoveBlanksW
PathFindFileNameW
PathFileExistsW
PathRemoveFileSpecW
PathStripPathW
PathAppendW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetProcessImageFileNameW
CryptSIPGetSignedDataMsg
CryptSIPVerifyIndirectData
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptQueryObject
CryptDecodeObject
CryptMsgUpdate
CryptMsgOpenToDecode
CryptSIPRetrieveSubjectGuidForCatalogFile
CryptMsgGetParam
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ