Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
derka.exe
Resource
win10-20240611-en
Target
derka.exe
Size
445KB
MD5
0fafabbbe5a6a1dae88df02e453ac23b
SHA1
2e0118d3f51c320d759006ef80f2aecd4f9184ab
SHA256
8fb481dadb1d763ba6e666ea1f5d89bc66e23a09e8e1c8705dc6c2f8ae891ee9
SHA512
27b35c404f8e9f2beedce1af87d5e8c2cad3bf248c604082f263ed14512ece1fa978e89e9582bc1ad29fa4c17cefb65997b448f73c763ac2184ac123465f8213
SSDEEP
12288:nOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPijggFE:nq5TfcdHj4fmbqFE
Processes:
resource | yara_rule |
---|---|
sample | upx |
AutoIT scripts compiled to PE executables.
Processes:
resource | yara_rule |
---|---|
static1/unpack001/out.upx | autoit_exe |
Checks for missing Authenticode signature.
Processes:
resource |
---|
unpack001/out.upx |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ