Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b715638a0ad36211d2f7a51ec4526830N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b715638a0ad36211d2f7a51ec4526830N.exe
Resource
win10v2004-20240709-en
Target
b715638a0ad36211d2f7a51ec4526830N.exe
Size
1.3MB
MD5
b715638a0ad36211d2f7a51ec4526830
SHA1
6aef544b11c9e703061824071b6592a443e2992c
SHA256
c1b4a0f4b7cbf2b3263818f1f24424e12d8e72c51371be4cbcadac4a42b5dc85
SHA512
5bff76c3efe80d5c05971f440e53e54d9c9b6fc7eace38ba4df23ceb5c36b423a3828ad7878c94df9b703f8c335706b4f97dfdb2cae3527c1ec548d15ccb3d8a
SSDEEP
24576:kcoG+x5lVkhyK+xuDt2yRImEgwSU7MjaU6Zjsks5+rK:ATlVk7TynojaJZjsz5MK
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileW
GetFileAttributesW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
GetComputerNameW
GetVersionExW
MultiByteToWideChar
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
GetTickCount
GetStartupInfoW
SetLastError
SetEndOfFile
WaitForMultipleObjectsEx
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
CreateProcessW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
CancelWaitableTimer
SetWaitableTimer
CreateWaitableTimerW
CreateEventW
OpenMutexW
CreateMutexW
lstrcmpW
ConnectNamedPipe
CloseHandle
ReadFile
WriteFile
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetErrorMode
GetOverlappedResult
RaiseException
CreateDirectoryW
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
GetProcAddress
FreeLibrary
InterlockedDecrement
WideCharToMultiByte
FindResourceExW
LockResource
FindResourceW
SizeofResource
LoadResource
GetLastError
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetTimeZoneInformation
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
SetProcessAffinityMask
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
SetConsoleCtrlHandler
SetCurrentDirectoryW
GetExitCodeProcess
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
ExitThread
lstrlenA
lstrlenW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
FatalAppExitA
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
CreateSemaphoreW
GetClassNameW
GetWindowThreadProcessId
SendMessageTimeoutW
UnregisterClassW
EnumWindows
EnumChildWindows
CharLowerBuffW
RegisterWindowMessageW
CryptExportKey
SetNamedSecurityInfoW
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
SetFileSecurityW
MakeAbsoluteSD
MakeSelfRelativeSD
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
InitializeSecurityDescriptor
AddAce
GetAclInformation
InitializeAcl
CopySid
GetLengthSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSid
GetTokenInformation
OpenProcessToken
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CLSIDFromString
CoCreateInstance
CoUninitialize
VarBstrCmp
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathAppendW
PathCombineA
PathCombineW
PathFileExistsW
PathMakePrettyW
PathRemoveArgsW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
PathUnquoteSpacesW
CryptStringToBinaryA
CryptBinaryToStringA
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpOpen
WinHttpCloseHandle
WinHttpSendRequest
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetModuleFileNameExW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ