Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8d10d0139e8faafb12e601bbcf4a1750N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d10d0139e8faafb12e601bbcf4a1750N.exe
Resource
win10v2004-20240709-en
Target
8d10d0139e8faafb12e601bbcf4a1750N.exe
Size
1.1MB
MD5
8d10d0139e8faafb12e601bbcf4a1750
SHA1
08e23844b488147b81a73aada1460ceeee738bfc
SHA256
23f6246d6706ad2930517ac3e997a98352a2d238291a308dd8e5eb6f563679f1
SHA512
7558aa48b5e6fca17da6fde6f635301b3743c9753f2f0ec67aefe80573551480dbcd10c754a742c3d99015e15bdf2bc7cd4c3ce3797368e9791d2725699f4c61
SSDEEP
24576:fW/nH+sblFamK15AMBPi8sDbQkACNNYqe8ZSmYxYzQp2fo:EnHTA15AsPCvNjZ3Ya0Ufo
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
GetComputerNameW
GetFileTime
ReleaseMutex
CreateMutexW
Sleep
CopyFileW
CreateWaitableTimerW
SetWaitableTimer
CancelWaitableTimer
CreateNamedPipeW
ConnectNamedPipe
WaitNamedPipeW
CancelIo
GetCurrentProcessId
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetErrorMode
GetCommandLineW
InterlockedCompareExchange
GetCurrentThreadId
InterlockedExchange
DecodePointer
FatalAppExitA
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
lstrlenW
lstrlenA
SetEnvironmentVariableA
SetEndOfFile
WaitForMultipleObjectsEx
SetEvent
WaitForMultipleObjects
ResetEvent
GetExitCodeProcess
OpenProcess
CreateEventW
LocalAlloc
InterlockedDecrement
FileTimeToSystemTime
FindClose
FindNextFileW
RemoveDirectoryW
FindFirstFileW
MoveFileExW
CreateProcessW
GetVersionExW
DeleteFileW
GetOverlappedResult
LocalFree
WaitForSingleObject
GetCurrentProcess
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
SetFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
GetCurrentDirectoryW
SystemTimeToFileTime
CreateDirectoryW
FreeLibrary
SetFilePointer
WriteFile
ReadFile
CreateFileW
CloseHandle
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceW
GetLastError
WriteConsoleW
ReadConsoleW
SetStdHandle
GetTimeZoneInformation
SetConsoleCtrlHandler
UnregisterWaitEx
GetNumaHighestNodeNumber
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
SetProcessAffinityMask
VirtualProtect
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
TlsFree
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileAttributesExW
LoadLibraryW
TerminateProcess
Process32NextW
GetFileType
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
CreateSemaphoreW
GetTickCount
GetStartupInfoW
SetLastError
Process32FirstW
GetFileAttributesW
CreateToolhelp32Snapshot
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
OutputDebugStringW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
AreFileApisANSI
GetTempPathW
CreateThread
ExitThread
RtlUnwind
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
GetCPInfo
UnregisterClassW
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CharUpperW
MessageBoxW
CharNextW
LoadStringW
CryptDestroyHash
RegisterServiceCtrlHandlerW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
StartServiceCtrlDispatcherW
SetServiceStatus
DeleteService
ChangeServiceConfig2W
CreateServiceW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
ControlService
QueryServiceStatus
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
CryptDeriveKey
IsValidSid
LookupAccountNameW
CryptGetHashParam
CryptHashData
CryptCreateHash
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
LookupAccountSidW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
CreateProcessAsUserW
CryptReleaseContext
CryptDestroyKey
CryptDecrypt
CryptEncrypt
CryptExportKey
CryptDuplicateKey
CryptGenKey
CryptImportKey
CryptAcquireContextW
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CLSIDFromString
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoAddRefServerProcess
CoReleaseServerProcess
StringFromCLSID
CoCreateInstance
CoUninitialize
SysAllocStringLen
VarUI4FromStr
VariantClear
SysFreeString
CreateErrorInfo
GetErrorInfo
SysAllocString
VariantInit
VariantChangeType
SetErrorInfo
PathFileExistsW
PathAppendW
PathCombineW
PathFindFileNameW
PathRemoveArgsW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRenameExtensionW
PathStripPathW
PathUnquoteSpacesW
PathFindExtensionW
PathIsDirectoryW
CryptBinaryToStringA
CryptStringToBinaryA
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpCrackUrl
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
CheckSumMappedFile
GetModuleFileNameExW
GetUdpTable
GetTcpTable
ntohs
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ