Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
downloader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
downloader.exe
Resource
win10v2004-20240709-en
Target
New folder.rar
Size
703KB
MD5
ce6b4e685743e76251a44bbabb7db6d5
SHA1
60acd26c554712001424399a6f76dd310578193a
SHA256
874763d8b9c863e6751e0853687d2d04fccd1f1b3c413f7397ae857118f3f0aa
SHA512
6b85f9b97a3b2f595a5e96b0094d4854ff71a9650e430c0ce5277c0e256ffa74d1bc2d2f715ee4349b2de9cff7945c3c31baf18e83858da53b06311363a3f863
SSDEEP
12288:0SSP1Jp5D+4d61CAW2PBUc0rSHY+O69vWhdr8IwqO6yHXxc+r1h:0Xtl+hCD24d+pwOxHBcCv
Checks for missing Authenticode signature.
resource |
---|
unpack001/log.dll |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Bamboo\home\xml-data\build-dir\CST-DLIN-SOURCES\bin\x64\ReleaseMT\downloader.pdb
GetModuleHandleExW
SetLastError
FreeLibrary
GetCurrentThreadId
GetProcessHeap
HeapAlloc
HeapFree
OutputDebugStringW
CloseHandle
LocalAlloc
ExpandEnvironmentStringsW
CreateFileW
GetFileInformationByHandle
LoadLibraryW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
DeviceIoControl
GetTickCount64
DeleteFileW
GetCurrentProcessId
FileTimeToSystemTime
GetCurrentProcess
GetProcessTimes
SetFileAttributesW
CreateDirectoryW
LockResource
LoadResource
SizeofResource
FindResourceW
GetProcAddress
GetLocalTime
GetModuleHandleA
FindClose
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
WriteConsoleW
LoadLibraryExW
ReleaseMutex
Sleep
SetEvent
CreateThread
GetCommandLineW
SetThreadPriority
GetCurrentThread
CreateMutexW
GetSystemTime
SystemTimeToFileTime
FindFirstFileW
FindNextFileW
GetFileAttributesW
CopyFileW
RemoveDirectoryW
MoveFileW
CreateProcessW
GetExitCodeProcess
TerminateProcess
GetFileTime
ReadFile
HeapSize
GetModuleHandleW
GetLastError
GetModuleFileNameW
LocalFree
MultiByteToWideChar
FindResourceExW
WideCharToMultiByte
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
FormatMessageA
FindFirstFileExW
GetFileAttributesExW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
GetFileInformationByHandleEx
WaitForSingleObjectEx
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetStringTypeW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
LCMapStringEx
CompareStringEx
GetCPInfo
GetLocaleInfoEx
InitializeCriticalSectionAndSpinCount
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetStdHandle
GetFileType
FlushFileBuffers
ExitProcess
GetStdHandle
WriteFile
GetCommandLineA
GetFileSizeEx
GetConsoleOutputCP
GetConsoleMode
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
RtlUnwind
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
CreateWellKnownSid
PathAddBackslashW
PathFileExistsW
PathRemoveBackslashW
PathRemoveFileSpecW
PathIsRelativeW
PathFindFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
AcquireSRWLockExclusive
AreFileApisANSI
CloseHandle
CreateFileA
CreateFileW
CreateToolhelp32Snapshot
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesExW
GetFileInformationByHandleEx
GetLastError
GetLocaleInfoEx
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryW
InitializeCriticalSectionEx
InitializeSListHead
InterlockedFlushSList
IsDebuggerPresent
IsProcessorFeaturePresent
LCIDToLocaleName
LCMapStringEx
LeaveCriticalSection
LoadLibraryW
LocalFree
MultiByteToWideChar
Process32FirstW
Process32NextW
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseSRWLockExclusive
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
SleepConditionVariableSRW
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WakeAllConditionVariable
WideCharToMultiByte
WriteFile
lstrcmpiW
CoGetObjectContext
CoInitializeEx
GetAdaptersAddresses
?terminate@@YAXXZ
_CxxThrowException
__C_specific_handler
__CppXcptFilter
__CxxFrameHandler
__DestructExceptionObject
___lc_codepage_func
___lc_handle_func
__getmainargs
__pctype_func
_amsg_exit
_callnewh
_clearfp
_errno
_fileno
_fsopen
_initterm
_iob
_isatty
_local_unwind
_lock
_lseeki64
_msize
_unlock
_wcsdup
abort
calloc
ceil
fclose
fflush
fgetc
fgetpos
fread
free
fseek
fsetpos
islower
isupper
log10
malloc
memcpy
memmove
memset
realloc
setvbuf
strchr
strlen
strrchr
strtol
tolower
ungetc
wcslen
wcsrchr
LogInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ