Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_bb720af02cbf6bc94d96550d0c38186c_karagany_mafia_revil.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_bb720af02cbf6bc94d96550d0c38186c_karagany_mafia_revil.exe
Resource
win10v2004-20240508-en
Target
2024-05-10_bb720af02cbf6bc94d96550d0c38186c_karagany_mafia_revil
Size
2.0MB
MD5
bb720af02cbf6bc94d96550d0c38186c
SHA1
670783299d78418770972c04b5fdbc6b77a86dbf
SHA256
d4bc3cc6ff9f6ed1c38788969b00dab12cb328a8fe2461dc62fc99bbf37ad652
SHA512
fcf78dcea32ceed861da27f057c2e2ec869fc0fa5701c4a1cbfac6ccc98892eab20aedf9e78cbb7e1fbda60e87e15901c25536e878c1443754f062d5a41910cc
SSDEEP
49152:wqSR0yzlQAgl0xmL3YIjXl3VjlAg4e2uAp/F0jGJZraaqvMFAu:Lwvgl0xmLoEllee2ugdLv
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\File_Transfer\25-Jul-20\remcom\3284435\REMCOM_BUILD\RemCom\Release\RemCom.pdb
WNetCancelConnection2A
WNetAddConnection2A
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetFileInformationByHandle
FindNextFileA
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
IsValidLocale
GetSystemTime
SystemTimeToFileTime
WideCharToMultiByte
LoadLibraryA
FreeLibrary
GlobalMemoryStatus
QueryPerformanceCounter
GetTickCount
FlushConsoleInputBuffer
MultiByteToWideChar
GetFileType
GetVersion
GetCurrentThreadId
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
SetConsoleCtrlHandler
GetComputerNameA
DeleteFileA
SetLastError
GetFileSize
CreateProcessA
WaitForSingleObject
ReadFile
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterA
SetConsoleCursorPosition
ExitThread
GetCurrentProcessId
SetConsoleTitleA
WaitNamedPipeA
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentDirectoryA
CreateFileA
WriteFile
CopyFileA
GetStdHandle
ReadConsoleA
GetConsoleMode
SetConsoleMode
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
GetLastError
GetDriveTypeW
FormatMessageA
LocalFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
PeekNamedPipe
SetCurrentDirectoryW
FindFirstFileA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TryEnterCriticalSection
TlsFree
TlsGetValue
TlsSetValue
GetExitCodeThread
SetEvent
TlsAlloc
SetThreadPriority
InterlockedExchange
GetCurrentDirectoryW
GetLongPathNameW
GetSystemDirectoryW
GetTempPathW
ExpandEnvironmentStringsW
GetLogicalDriveStringsW
GetSystemTimeAsFileTime
CreateEventW
GetSystemInfo
GetEnvironmentVariableW
SetEnvironmentVariableW
GetVersionExA
GetComputerNameW
GetVersionExW
CreateFileW
GetFileAttributesW
GetFileAttributesExW
SetFileTime
SetEndOfFile
SetFilePointer
SetFileAttributesW
CopyFileW
MoveFileExW
DeleteFileW
RemoveDirectoryW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
CreateMutexW
ReleaseMutex
ResetEvent
WaitForMultipleObjects
InitializeCriticalSection
EncodePointer
DecodePointer
InterlockedCompareExchange
RaiseException
RtlUnwind
GetModuleHandleW
ExitProcess
ResumeThread
CreateThread
MoveFileA
GetCommandLineA
HeapSetInformation
HeapReAlloc
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
HeapDestroy
GetCurrentThread
SetHandleCount
GetStartupInfoW
FatalAppExitA
GetConsoleCP
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetModuleFileNameW
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSize
SetStdHandle
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
ReleaseDC
GetProcessWindowStation
OpenWindowStationA
GetDC
GetUserObjectInformationW
MessageBoxA
SetUserObjectSecurity
GetUserObjectSecurity
CloseDesktop
CloseWindowStation
SetProcessWindowStation
OpenDesktopA
GetDeviceCaps
CreateCompatibleBitmap
GetObjectA
GetDIBits
DeleteObject
GetAclInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
AllocateAndInitializeSid
FreeSid
EqualSid
GetTokenInformation
OpenProcessToken
CryptDecrypt
CryptCreateHash
CryptSetHashParam
CryptSignHashA
CryptDestroyHash
CryptExportKey
CryptGetUserKey
CryptAcquireContextA
CryptGetProvParam
CryptDestroyKey
CryptReleaseContext
CryptEnumProvidersA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserA
AddAccessAllowedAce
GetSecurityDescriptorDacl
CryptGenRandom
InitializeAcl
GetAce
AddAce
LogonUserA
CreateProcessWithLogonW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
GetLengthSid
CopySid
GetAdaptersInfo
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertDuplicateCertificateContext
send
recv
WSAGetLastError
shutdown
closesocket
WSASetLastError
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ