Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_26ab58e4965a8dc5db791f24b6fab2ad_qakbot_ryuk_sliver.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-28_26ab58e4965a8dc5db791f24b6fab2ad_qakbot_ryuk_sliver.exe
Resource
win10v2004-20240508-en
Target
2024-05-28_26ab58e4965a8dc5db791f24b6fab2ad_qakbot_ryuk_sliver
Size
17.1MB
MD5
26ab58e4965a8dc5db791f24b6fab2ad
SHA1
5383811a091244ae2f82172cb0ec776a7a203a4f
SHA256
c8fb8b44caf68107d99445790ea82ee10c605257811d27617f0ef66dd2572854
SHA512
4377c56c3feedd47d1f5293a2d1bae082788c6359a10aa2fa2bcc7eaa18f4cacb50c14fa22c6370d22a806623376867e7ccec3872a7c6cd4c921659db8cd0558
SSDEEP
196608:4GoE+GORFMso4PjDCAU1YTeeEh1AKhmrKEb0U+Zf/1Qe09lHwsguD63D7I6L57FJ:c5ROso4yAkhO44H9fz6fLRFgbqsQjV3
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
EntSetup64.pdb
DeregisterEventSource
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
CryptEnumProvidersW
CryptSignHashW
GetUserNameA
CloseServiceHandle
DeleteService
OpenSCManagerA
OpenServiceA
CryptDestroyHash
SetFileSecurityA
ConvertStringSecurityDescriptorToSecurityDescriptorA
AllocateAndInitializeSid
FreeSid
SetEntriesInAclA
SetNamedSecurityInfoA
StartServiceA
CryptCreateHash
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegGetValueW
RegOpenKeyExW
RegSetValueExW
RegSetKeySecurity
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegGetKeySecurity
CryptDecrypt
MakeSelfRelativeSD
GetSecurityDescriptorLength
InitializeSecurityDescriptor
IsValidSecurityDescriptor
SetSecurityDescriptorSacl
GetSecurityDescriptorControl
SetEntriesInAclW
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
GetSecurityInfo
GetTokenInformation
InitiateSystemShutdownA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegConnectRegistryA
RegDeleteKeyA
PathAddExtensionA
PathAppendA
PathRemoveFileSpecA
PathFileExistsA
ord204
ord141
ord15
ord112
PropertySheetA
ImageList_Create
ImageList_Add
InitCommonControlsEx
ord17
freeaddrinfo
getaddrinfo
WSAStringToAddressA
WSAAddressToStringA
WSAGetLastError
inet_ntoa
GetModuleFileNameExA
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFreeCertificateContext
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
UpdateResourceA
EndUpdateResourceA
CopyFileA
GetComputerNameA
VerifyVersionInfoW
SystemTimeToFileTime
MultiByteToWideChar
GlobalAlloc
GlobalUnlock
GlobalLock
GetPrivateProfileStringA
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
DeviceIoControl
InitializeCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
GetTickCount
MulDiv
GetLocaleInfoA
OutputDebugStringA
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFileTime
SetEndOfFile
SetFileAttributesA
EnterCriticalSection
LeaveCriticalSection
TerminateThread
ResumeThread
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
MoveFileA
VirtualAlloc
VirtualFree
GetCurrentProcessId
GetCurrentProcess
Sleep
SetErrorMode
GlobalFree
GetCPInfo
RemoveDirectoryA
TerminateProcess
OpenProcess
GetWindowsDirectoryA
WinExec
BeginUpdateResourceA
LocalFree
MoveFileExA
GetCurrentThreadId
GetCommandLineA
GetCommandLineW
ExpandEnvironmentStringsA
CreateDirectoryA
ExitProcess
GetSystemWow64DirectoryA
CreateSemaphoreA
OpenSemaphoreA
WideCharToMultiByte
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
CreateFileW
SetFilePointerEx
ProcessIdToSessionId
CreateProcessW
FlushFileBuffers
CreateDirectoryW
GetLocalTime
LocalAlloc
CreateToolhelp32Snapshot
GetModuleFileNameW
GetModuleHandleW
CreateEventW
ResetEvent
CreateMutexW
ReleaseMutex
HeapCreate
HeapDestroy
LocalReAlloc
GetACP
CreateMutexA
VirtualProtect
Process32First
Process32Next
GetFullPathNameA
GetThreadPriority
GetSystemInfo
LoadResource
LockResource
SizeofResource
FormatMessageA
FindResourceA
GetComputerNameW
GetDateFormatA
GetTimeFormatA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
SetLastError
LoadLibraryExA
GlobalSize
lstrcmpA
lstrcmpiA
IsDBCSLeadByte
GetFullPathNameW
FindFirstFileW
FindNextFileW
GetStdHandle
GetFileType
LoadLibraryW
FlushConsoleInputBuffer
QueryPerformanceCounter
GlobalMemoryStatus
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapReAlloc
SetConsoleCtrlHandler
GetConsoleCP
ReadConsoleW
GetConsoleMode
TzSpecificLocalTimeToSystemTime
VirtualQuery
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
TryEnterCriticalSection
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
lstrlenA
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExA
SetConsoleMode
ReadConsoleInputA
HeapSize
SetStdHandle
GetCurrentDirectoryW
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
GetSystemDirectoryA
GetSystemTime
CreateProcessA
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
CloseHandle
GetTempFileNameA
GetTempPathA
WriteFile
SetFileTime
SetFilePointer
ReadFile
GetFileSize
GetDriveTypeA
DeleteFileA
CreateFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
VerSetConditionMask
EnumSystemLocalesW
GetExitCodeProcess
CreateAcceleratorTableA
DestroyAcceleratorTable
InvalidateRgn
AdjustWindowRectEx
GetClassLongPtrA
GetDesktopWindow
GetTopWindow
WinHelpA
EnumDisplaySettingsA
GetUserObjectInformationW
MessageBoxW
GetCapture
GetFocus
DeferWindowPos
ClientToScreen
EnableMenuItem
GetSystemMenu
CloseWindow
GetWindow
CharPrevA
CharNextA
CloseDesktop
CreateDesktopA
LoadStringA
LoadIconA
DrawFocusRect
RegisterClassA
PostQuitMessage
GetMessageA
KillTimer
SetTimer
GetKeyState
UpdateWindow
IsDialogMessageA
SetForegroundWindow
IsWindow
PeekMessageA
DispatchMessageA
TranslateMessage
LoadImageA
LoadBitmapA
GetClassNameA
IsChild
SetWindowLongA
GetSysColorBrush
ScreenToClient
GetWindowRect
CreateDialogParamA
SetWindowPos
MoveWindow
MessageBeep
GetClipboardData
EnumWindows
GetClassInfoExA
RegisterWindowMessageA
wsprintfW
GetProcessWindowStation
EndDeferWindowPos
BeginDeferWindowPos
PtInRect
DrawTextA
GetForegroundWindow
GetClientRect
MessageBoxA
OffsetRect
ShowWindow
SetWindowTextA
GetDlgItem
CheckDlgButton
IsDlgButtonChecked
EnableWindow
SetDlgItemTextA
IsWindowVisible
GetCursor
SetCursor
MapVirtualKeyExA
GetKeyNameTextA
GetKeyboardLayout
IsWindowEnabled
GetDlgItemInt
SetDlgItemInt
GetWindowTextLengthA
GetWindowTextA
SendDlgItemMessageA
EndDialog
DialogBoxParamA
GetWindowThreadProcessId
MapVirtualKeyA
VkKeyScanW
ReleaseDC
SendMessageA
GetDlgItemTextA
GetSystemMetrics
GetAsyncKeyState
PostMessageA
CallWindowProcA
OpenClipboard
CloseClipboard
SetClipboardData
RegisterClipboardFormatA
EmptyClipboard
SetFocus
CreatePopupMenu
SetRect
ReleaseCapture
SetParent
SetCapture
GetParent
GetWindowLongA
LoadCursorA
FillRect
GetSysColor
RemovePropA
GetPropA
SetPropA
RedrawWindow
InvalidateRect
EndPaint
BeginPaint
GetDC
DestroyWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
UnregisterClassA
wsprintfA
CheckRadioButton
SetWindowLongPtrA
GetWindowLongPtrA
GetCursorPos
TrackPopupMenu
AppendMenuA
DestroyMenu
CreatePatternBrush
SetMapMode
GetMapMode
CreateCompatibleDC
StretchBlt
GetObjectA
DPtoLP
GetTextExtentPointA
TranslateCharsetInfo
CreateBitmap
CreateCompatibleBitmap
CreateBrushIndirect
BitBlt
GetStockObject
MoveToEx
LineTo
GetTextExtentPoint32A
GetDeviceCaps
CreateSolidBrush
CreatePen
CreateFontA
SetTextColor
SetBkMode
SetBkColor
SelectObject
DeleteObject
DeleteDC
CreateFontIndirectA
GetSaveFileNameA
GetOpenFileNameA
SHGetFolderPathA
CommandLineToArgvW
SHCreateDirectoryExA
SHFileOperationA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
SHBrowseForFolderA
StringFromCLSID
CoTaskMemFree
CoInitializeEx
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
StringFromGUID2
CoTaskMemRealloc
OleInitialize
OleUninitialize
OleLockRunning
CoCreateInstance
CoUninitialize
CLSIDFromString
CoCreateGuid
CoSetProxyBlanket
CoInitializeSecurity
CoInitialize
CoTaskMemAlloc
SysStringLen
SysAllocString
VariantInit
VariantClear
VariantCopy
VariantChangeType
SysAllocStringLen
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayCreateVector
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysFreeString
URLDownloadToFileA
InternetGetConnectedState
InternetAttemptConnect
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
OPENSSL_Applink
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ