Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a9b61ed4b94710f38fb687244b097b20ef9ca47a88c23c84a9303b322daae843.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a9b61ed4b94710f38fb687244b097b20ef9ca47a88c23c84a9303b322daae843.exe
Resource
win10v2004-20240226-en
Target
a9b61ed4b94710f38fb687244b097b20ef9ca47a88c23c84a9303b322daae843.zip
Size
157KB
MD5
36ea5ccac62301a8aa997acfbde9c193
SHA1
e32f3e21368b796d78da11f49552bec25dc9ec63
SHA256
b5a218bd5559cee36410ad6dc6db3d5023df20c34c3705089faefa05744f5bdf
SHA512
0f10f89a734fb7dfd1aa171f1a3bb4691cfe2284360b1caccd4ad54677fa5a1166111099f24c172d26f837a1e1a93838ea4ddc3e7931ac616f95a9daf93790c9
SSDEEP
3072:jylbP+cFb+O9EeiUAXj4/gXrKv8LAzG+DQwt2G/6chSH3JxEcBRCZUWqqJfs1X:elNFKaEes+OdczG4/6chSH3AKypqq+1X
Detect suspicious telegram bot.
resource | yara_rule |
---|---|
static1/unpack001/a9b61ed4b94710f38fb687244b097b20ef9ca47a88c23c84a9303b322daae843 | suspicious_telegram_bot |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\tmfch\source\repos\Clipper\Release\result.pdb
GetProcessHeap
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
SetStdHandle
HeapSize
CreateFileW
GetProcAddress
LoadLibraryA
GetComputerNameA
GetLastError
GlobalAlloc
GetEnvironmentStringsW
CreateMutexW
RaiseException
GetCurrentThreadId
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
WakeAllConditionVariable
SleepConditionVariableSRW
QueryPerformanceCounter
QueryPerformanceFrequency
InitOnceComplete
InitOnceBeginInitialize
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
Sleep
WideCharToMultiByte
CloseHandle
MultiByteToWideChar
LCMapStringEx
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
HeapReAlloc
HeapFree
HeapAlloc
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
WriteConsoleW
GetSystemMetrics
ReleaseDC
OpenClipboard
GetDC
EmptyClipboard
GetClipboardData
GetClipboardSequenceNumber
SetClipboardData
CloseClipboard
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetDIBits
DeleteDC
DeleteObject
BitBlt
GetUserNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ