Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8378960ee2bfc32930e19f762f561f4a6448160de2bde6ce330309326d745f89.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8378960ee2bfc32930e19f762f561f4a6448160de2bde6ce330309326d745f89.exe
Resource
win10v2004-20240709-en
Target
8378960ee2bfc32930e19f762f561f4a6448160de2bde6ce330309326d745f89.exe
Size
25.9MB
MD5
54aaa06d7effc624c4547fc1695f1dc5
SHA1
de21608166b77d6a3c9874b94f20a8c5e95b0b1b
SHA256
8378960ee2bfc32930e19f762f561f4a6448160de2bde6ce330309326d745f89
SHA512
c86ca097b93f75801bef8828f15bba40c80658e540065e4041b3bee1de6bfb885b97346a576a446525a23d231d37ef21be64346dc11fe270b445e5a3b06a3bdb
SSDEEP
786432:joXP+bf3dwL7ZncQv/oPsA88UrcqKrr5ZIMi7tha7rQcD:8+r3dwL7HoP78s35Zat2rVD
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetCurrentProcess
WriteFile
VirtualAlloc
GetModuleFileNameW
CreateMutexW
GetCurrentThreadId
EnumSystemLocalesA
MultiByteToWideChar
GetTempPathA
CreateFileA
GetModuleFileNameA
DeleteFileA
GetProcAddress
ExitProcess
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
WinExec
Sleep
SetEndOfFile
WriteConsoleW
CreateFileW
SetStdHandle
SetEnvironmentVariableW
GetProcessHeap
LocalReAlloc
HeapAlloc
HeapFree
DeleteCriticalSection
DecodePointer
RaiseException
CloseHandle
GetLastError
LocalAlloc
FindClose
InitializeCriticalSectionEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
RtlUnwind
HeapSize
HeapReAlloc
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
SetFilePointerEx
GetFileSizeEx
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleHandleExW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LocalFree
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryExW
MessageBoxA
CryptDestroyKey
CryptAcquireContextW
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
RegSetValueExA
CryptDestroyHash
RegDeleteValueA
CryptReleaseContext
EnumServicesStatusA
RegCloseKey
CloseServiceHandle
OpenSCManagerW
RegOpenKeyExW
ord680
FindExecutableA
VariantClear
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ