Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
s.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
s.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
x.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
x.dll
Resource
win10v2004-20240226-en
Target
maladro.zip
Size
1.8MB
MD5
ef6a681af19ab579f2d274c93f1388a6
SHA1
fa2787f00552a2b4b6203d87aca5738960e3fb50
SHA256
2bf4e46d7dd2f69d92bd538c699a0967e258acc22d453d44a3212717e50e1053
SHA512
9f0ea43cfc6c97aea124607a55ed25d33947c6ef0b8e3dd035be10d0ad18c21fe812ebc92a02780c8a19fc9c5b02ffb3f4339b615b8a1a0c75bf33948a5b220b
SSDEEP
49152:iWzM4RWr66tRKyJcVvui/VwyS+6choROKH1W:b3W9tnC9L2FyhCDH1W
resource | yara_rule |
---|---|
static1/unpack001/x.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/x.dll |
unpack002/out.upx |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\ci-jenkins\workspace\Airsupport\AirSupport_Client6.0\AirSupport-Client-6.0\src\build\symbol\Release\x64\Update.pdb
connect
closesocket
bind
socket
WSAGetLastError
__WSAFDIsSet
select
send
shutdown
htonl
gethostbyname
getservbyname
recv
WSASetLastError
gethostname
ioctlsocket
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getpeername
getsockname
getsockopt
ord127
ord27
ord26
ord118
ord41
ord208
ord216
ord147
ord14
ord46
ord219
ord167
ord142
ord79
ord133
ord301
ord145
GlobalMemoryStatus
FlushConsoleInputBuffer
LoadLibraryA
LocalFree
GetCurrentProcess
GetSystemTimeAsFileTime
HeapAlloc
GetProcessHeap
HeapFree
lstrlenW
WideCharToMultiByte
lstrcpyW
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
ReadFile
SetLastError
FormatMessageA
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
VerSetConditionMask
QueryPerformanceFrequency
GetSystemDirectoryW
VerifyVersionInfoW
WaitForSingleObjectEx
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
GetFullPathNameW
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetExitCodeProcess
GetVersionExW
GetSystemInfo
InitializeCriticalSection
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
ResetEvent
LocalAlloc
FindClose
TerminateProcess
GetDriveTypeW
GetTimeZoneInformation
ReadConsoleW
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetLocaleInfoW
CompareStringW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlCaptureContext
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
FileTimeToSystemTime
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
LoadLibraryExW
ExitThread
CreateThread
SetConsoleMode
ReadConsoleInputA
QueryPerformanceCounter
MultiByteToWideChar
GetModuleHandleW
GetVersion
GetCurrentThreadId
WriteFile
GetFileType
GetStdHandle
RtlVirtualUnwind
GetFileSize
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryW
OpenProcess
GetTickCount
FindNextFileW
MoveFileExW
Sleep
CreateSemaphoreW
GetTimeFormatW
GetDateFormatW
GetUserDefaultUILanguage
CreateDirectoryW
GetFileAttributesW
RemoveDirectoryW
GetLocalTime
FindFirstFileW
SetFileAttributesW
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
GetFileAttributesExW
IsValidLocale
GetModuleFileNameW
CopyFileW
OutputDebugStringW
WaitForSingleObject
GetLastError
SetEvent
CloseHandle
CreateEventA
SetStdHandle
FindFirstFileExW
GetThreadTimes
InitializeSListHead
WriteConsoleW
SetEnvironmentVariableA
GetConsoleMode
IsProcessorFeaturePresent
IsDebuggerPresent
SetConsoleCtrlHandler
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetCommandLineW
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SystemTimeToFileTime
OpenEventA
GetStringTypeExW
GetUserDefaultLCID
LCMapStringW
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
HeapDestroy
RaiseException
DecodePointer
EncodePointer
GetCurrentThread
GetStringTypeW
GetCurrentDirectoryW
GetSystemTime
DispatchMessageW
GetWindowRect
TranslateMessage
MsgWaitForMultipleObjects
FindWindowExW
GetSystemMetrics
FindWindowW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
SendMessageW
PeekMessageW
LoadStringW
GetSecurityDescriptorOwner
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
RegisterEventSourceW
ReportEventW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegFlushKey
RegQueryValueExW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
InitializeSecurityDescriptor
MakeAbsoluteSD
GetSecurityDescriptorControl
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetAclInformation
AddAce
InitializeAcl
IsValidSid
GetLengthSid
CopySid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
RegEnumValueW
RegSetValueExW
DeregisterEventSource
SHGetFolderPathW
CoCreateGuid
PathFindFileNameA
PathFileExistsW
GdiplusShutdown
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
RpcStringFreeW
UuidToStringW
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertOpenStore
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Init
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Init
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ