Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2.exe
Resource
win10v2004-20240802-en
Target
885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2.exe
Size
2.5MB
MD5
412329c850f3de11081831435a850fff
SHA1
cab0b2d0f7e1450a7abd85db033b9c98bf128cf6
SHA256
885782f6839b2709affd077777fa647b4bd590dc080e4b63e5558d60b4bce0d2
SHA512
8fe106741d6db3cbf3764ee28e280212bdcb3fff77e271f0df494348d758fe319f671dfd8f183956518ad7d4a81c9f6108cfaf2fa660d726438d0da8daaa86aa
SSDEEP
49152:Iq//YOIWW90S2I9fo8THGnIcQkzfSplLE83kH3/Iozbh:Iq/BUx9HKap+LHPIg
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins_win\workspace\cpp-webuff\cpp\src\webuff\bin\Release\WeBuffCore.pdb
NtResumeProcess
NtSuspendProcess
RtlUnwind
GetCurrentProcess
GetFileSize
ReadFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
lstrcmpiW
Module32FirstW
Module32NextW
TerminateProcess
GetModuleFileNameW
GetModuleFileNameA
CreateEventW
CreateProcessW
K32GetProcessMemoryInfo
FindFirstFileW
FindNextFileW
FindClose
CreateFileA
WaitNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
FlushFileBuffers
DisconnectNamedPipe
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
CreateDirectoryW
GetLogicalDriveStringsW
QueryDosDeviceW
lstrlenW
lstrcpyW
lstrcatW
K32GetProcessImageFileNameW
GetFullPathNameW
GetExitCodeProcess
CreateEventA
LoadLibraryW
DeleteFileA
SetFileAttributesA
SetFileAttributesW
lstrcpyA
lstrcatA
FindFirstFileA
lstrcmpiA
FindNextFileA
RemoveDirectoryA
GetFileAttributesA
InitializeCriticalSection
DeleteCriticalSection
LocalFree
LocalAlloc
CreateNamedPipeW
GetTickCount
ResetEvent
EnterCriticalSection
LeaveCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
CopyFileW
FreeResource
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFinalPathNameByHandleA
GetPrivateProfileIntA
CreateDirectoryA
SetUnhandledExceptionFilter
GetCurrentThread
GetCurrentThreadId
IsWow64Process
PostQueuedCompletionStatus
CreateIoCompletionPort
GetQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
GetThreadTimes
FindFirstFileExW
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
EnumSystemLocalesW
SetLastError
GetModuleHandleW
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
Sleep
CloseHandle
WriteFile
CreateFileW
DeleteFileW
SetEvent
GetLastError
GetLocalTime
VirtualFree
VirtualAlloc
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetStdHandle
ExitProcess
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleExW
SetEndOfFile
WriteConsoleW
SetStdHandle
InitializeSListHead
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
ExitThread
GetTimeZoneInformation
GetFileAttributesExW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
FreeLibrary
OutputDebugStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
WaitForMultipleObjects
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
TryEnterCriticalSection
EncodePointer
DecodePointer
RaiseException
DuplicateHandle
WaitForSingleObjectEx
GetExitCodeThread
GetNativeSystemInfo
IsProcessorFeaturePresent
QueueUserWorkItem
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
FindResourceExW
CharNextW
GetIconInfo
GetParent
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
MessageBoxW
GetObjectW
DeleteObject
InitializeSecurityDescriptor
OpenThreadToken
RegEnumKeyExA
RegOpenKeyExW
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
LookupPrivilegeValueW
RegEnumKeyExW
RegQueryInfoKeyW
AdjustTokenPrivileges
OpenProcessToken
SHGetSpecialFolderPathA
ShellExecuteA
ExtractIconExW
CoInitialize
CoInitializeEx
CoCreateInstance
CoUninitialize
OleRun
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
PathAddBackslashA
PathRemoveFileSpecA
PathAddBackslashW
PathRemoveFileSpecW
StrCpyW
StrToIntW
PathFindFileNameW
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipGetImagePixelFormat
GdipBitmapLockBits
GdipGetImageWidth
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateBitmapFromHICON
GdipGetImageHeight
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipFree
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpen
WinHttpCloseHandle
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ