Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
AdvancedRun.exe
Resource
win7-20240708-en
Target
AdvancedRun.exe
Size
168KB
MD5
3f44dd7f287da4a9a1be82e5178b7dc8
SHA1
996fcf7b6c0a5ed217a46b013c067e0c1fe3eba9
SHA256
e8000766c215b2df493c0aa0d8fa29fae04b1d0730ad1e7d7626484dc9d7b225
SHA512
1d6b602bf9b3680d14c3c18d69c2ac446ad2c204fca23da6300b250a2907e24cf14604dc7d6c2649422071169de71d9fc47308bfbbb7304b87d8d238aa419d03
SSDEEP
3072:L5jBWyD160H2dSDtrJIfnqmV143WRwMgB72js+TnPOzD7X:l9P1z2gDtDHBCj2n7
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource | yara_rule |
---|---|
sample | Nirsoft |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\Projects\VS2005\AdvancedRun\x64\Release\AdvancedRun.pdb
_wtol
__dllonexit
swscanf
_wcslwr
_onexit
__C_specific_handler
_XcptFilter
_c_exit
strlen
qsort
_itow
malloc
_memicmp
free
_wcsicmp
_exit
memcmp
wcstoul
wcscmp
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
_ultow
memcpy
_purecall
wcsrchr
memset
wcslen
_wtoi
wcscpy
wcschr
_wcsnicmp
wcscat
_snwprintf
_commode
_fmode
__set_app_type
_cexit
exit
wcsncat
__wgetmainargs
_wcmdln
_initterm
modf
__setusermatherr
ImageList_SetImageCount
ImageList_AddMasked
ord17
ImageList_Create
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
DestroyEnvironmentBlock
CreateEnvironmentBlock
CompareFileTime
GetStartupInfoW
ResumeThread
VirtualAllocEx
VirtualFreeEx
CreateThread
DeleteFileW
GetProcessAffinityMask
WaitForSingleObject
FreeEnvironmentStringsW
CloseHandle
GetLastError
GetCurrentProcessId
SetProcessAffinityMask
OpenProcess
LocalFree
SearchPathW
ExpandEnvironmentStringsW
CreateProcessW
ReadProcessMemory
SetEnvironmentVariableW
GetEnvironmentStringsW
GetExitCodeProcess
GetModuleHandleW
GetProcAddress
FreeLibrary
WriteProcessMemory
GetCurrentProcess
FileTimeToSystemTime
LoadLibraryW
GetDriveTypeW
GetVersionExW
GetTimeFormatW
GetFileAttributesW
WriteFile
FindResourceW
LoadResource
GetModuleFileNameW
GetWindowsDirectoryW
LoadLibraryExW
GetSystemDirectoryW
lstrlenW
WideCharToMultiByte
LockResource
lstrcpyW
GetDateFormatW
SizeofResource
FormatMessageW
EnumResourceNamesW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
SetErrorMode
GetCurrentDirectoryW
ExitProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateRemoteThread
EnumResourceTypesW
Sleep
CopyFileW
GetExitCodeThread
CreateEventW
SetEvent
ShowWindow
DeferWindowPos
SetWindowPos
SendDlgItemMessageW
EndDialog
GetWindow
GetWindowRect
GetDlgItem
DrawFrameControl
InvalidateRect
GetWindowTextLengthW
SetWindowTextW
UpdateWindow
SendMessageW
EndPaint
SetDlgItemTextW
GetDlgItemTextW
GetWindowPlacement
SetWindowLongPtrW
GetSystemMetrics
BeginPaint
GetClientRect
MessageBoxW
LoadImageW
GetSysColor
SetWindowLongW
GetWindowLongW
CallWindowProcW
GetSysColorBrush
EndDeferWindowPos
BeginDeferWindowPos
SetFocus
EnableWindow
MapWindowPoints
GetParent
MoveWindow
GetDC
ReleaseDC
GetClassNameW
GetMenuItemCount
LoadMenuW
GetMenuItemInfoW
GetDlgCtrlID
DestroyMenu
CreateDialogParamW
DialogBoxParamW
EnumChildWindows
LoadStringW
GetDesktopWindow
DestroyWindow
GetWindowTextW
DestroyIcon
LoadCursorW
SetCursor
ChildWindowFromPoint
GetKeyState
GetDeviceCaps
SetTextColor
CreateFontIndirectW
SetBkMode
DeleteObject
GetSaveFileNameW
GetOpenFileNameW
GetTokenInformation
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
DeleteService
CreateServiceW
SetServiceStatus
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
OpenProcessToken
RegDeleteKeyW
RegCloseKey
OpenServiceW
SetTokenInformation
RevertToSelf
OpenSCManagerW
CreateProcessAsUserW
CloseServiceHandle
ImpersonateLoggedOnUser
QueryServiceStatus
StartServiceW
ControlService
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetFileInfoW
ShellExecuteExW
DragQueryFileW
DragFinish
ShellExecuteW
DragAcceptFiles
CoUninitialize
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ