Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Set-up.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Set-up.exe
Resource
win10v2004-20240802-en
Target
Set-up.exe
Size
5.2MB
MD5
5d6e2f7229d4b2f0257614b6143722ba
SHA1
9a513f9d18c6eb41afda5e4531a4d935a417004c
SHA256
5e67527a31ad1d666cc8cbbaad4569c6cb32e413746b3949b6dbac59a4b53794
SHA512
d4278df5d4dec8628ba7169001d8efcb2269e0e3de5e529abad7be83cb77d1b9108487736dd287c6d1c2cd0437fd3a37703d001c25d2cdd7efeea2afb4410961
SSDEEP
98304:TAGIx+hQHFvdTjTF1TGqAnaiiljqQC/EVQy3:sGIgYTPF1TGq9E/EVD3
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Set-up.pdb
CM_Get_DevNode_Status
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
InitCommonControlsEx
SHGetFolderLocation
SHGetPathFromIDListW
SHGetFolderPathW
ord680
SHGetSpecialFolderPathW
SHGetKnownFolderPath
SHCreateDirectoryExW
SHGetMalloc
SHBrowseForFolderW
SHGetSpecialFolderLocation
ord51
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
PathFileExistsA
PathAppendW
PathIsSystemFolderW
SHGetValueW
UrlIsW
PathRemoveExtensionW
PathAddExtensionW
PathIsFileSpecW
PathIsRootW
PathIsNetworkPathW
PathRenameExtensionW
PathRemoveBackslashW
PathFileExistsW
PathIsDirectoryW
PathRemoveFileSpecW
PathStripPathW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
PathIsRelativeW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetTempPathW
CreateFileW
GetVersionExW
GetComputerNameExW
FileTimeToSystemTime
CloseHandle
RaiseException
LoadLibraryW
GetProcAddress
LocalFree
CreateProcessW
GetModuleHandleW
FreeLibrary
FindFirstFileW
FindNextFileW
TerminateProcess
RemoveDirectoryW
GetModuleFileNameW
FindClose
WaitForSingleObject
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
DeleteFileW
Process32FirstW
CopyFileW
GetExitCodeProcess
ReadFile
SetLastError
lstrlenW
LocalAlloc
GetFileAttributesW
FormatMessageW
GetDiskFreeSpaceExW
GetCurrentDirectoryW
SetCurrentDirectoryW
MoveFileExW
GetFileSize
lstrcpyW
lstrcmpiW
lstrcmpW
GetDriveTypeW
InitializeCriticalSectionEx
DecodePointer
DeleteCriticalSection
GetFullPathNameW
HeapSize
HeapReAlloc
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetSystemDirectoryW
SetDllDirectoryW
GetStdHandle
AttachConsole
FreeConsole
GetConsoleWindow
CreateMutexW
ReleaseMutex
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
WriteFile
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
UnmapViewOfFile
GetModuleHandleA
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
GetSystemInfo
HeapCompact
UnlockFile
CreateFileMappingA
LockFileEx
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetProcessHeap
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
SizeofResource
LockResource
LoadResource
FindResourceW
CreateEventW
GlobalFree
VerSetConditionMask
VerifyVersionInfoW
GetUserDefaultLCID
LCMapStringW
DuplicateHandle
ProcessIdToSessionId
SetEvent
TerminateThread
CreateThread
FindResourceExW
ResetEvent
GetThreadTimes
QueryFullProcessImageNameW
WaitForMultipleObjects
GetFileSizeEx
GetUserDefaultLangID
GetUserDefaultUILanguage
SetNamedPipeHandleState
CreateNamedPipeW
ConnectNamedPipe
CreateDirectoryW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
ReleaseSemaphore
OpenSemaphoreW
CreateSemaphoreW
GetLocalTime
GetTimeFormatW
GetDateFormatW
OpenMutexW
GetTimeZoneInformation
CreateSymbolicLinkW
QueryPerformanceFrequency
GetCurrentThread
SetFilePointerEx
ResumeThread
LoadLibraryExW
InterlockedPopEntrySList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
CompareStringW
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
SwitchToThread
GetStringTypeW
LoadLibraryExA
VirtualQuery
VirtualProtect
HeapAlloc
HeapFree
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
VirtualFree
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RtlUnwind
GetFileType
SetStdHandle
ExitThread
GetModuleHandleExW
WriteConsoleW
ExitProcess
IsValidLocale
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
RegisterWaitForSingleObject
UnregisterWait
GetSystemTime
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FreeLibraryAndExitThread
HeapValidate
InvalidateRgn
DispatchMessageW
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
AttachThreadInput
GetSysColor
GetForegroundWindow
AllowSetForegroundWindow
CreateAcceleratorTableW
SetFocus
CharNextW
ShowWindow
GetShellWindow
EnumWindows
PostThreadMessageW
wsprintfW
GetWindowLongW
PostMessageW
IsWindow
SystemParametersInfoW
EnableMenuItem
BringWindowToTop
TranslateAcceleratorW
TranslateMessage
GetParent
GetClassNameW
LoadIconW
GetSystemMetrics
GetWindowThreadProcessId
GetSystemMenu
GetClassLongW
SetCapture
SetWindowLongW
GetClientRect
GetDlgItem
PostQuitMessage
GetClassInfoExW
RegisterWindowMessageW
ReleaseCapture
SetForegroundWindow
InvalidateRect
IsIconic
BeginPaint
EndPaint
GetWindowTextW
GetWindowRect
GetDC
SetWindowPos
MessageBoxW
SendMessageW
GetDesktopWindow
ReleaseDC
UnregisterClassW
GetWindowTextLengthW
GetMessageW
DefWindowProcW
CallWindowProcW
GetActiveWindow
RegisterClassExW
AppendMenuW
SetWindowTextW
ScreenToClient
CreateWindowExW
FillRect
DestroyWindow
GetFocus
GetWindow
GetAsyncKeyState
SetClassLongW
LoadImageW
MoveWindow
LoadCursorW
DeleteDC
GetObjectW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
DeleteObject
CreateSolidBrush
GetDeviceCaps
GetStockObject
GetTokenInformation
CreateWellKnownSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExW
SetNamedSecurityInfoW
SetEntriesInAclW
RegFlushKey
LookupAccountSidW
EqualSid
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
DuplicateTokenEx
ConvertSidToStringSidW
ImpersonateLoggedOnUser
ConvertStringSidToSidW
RevertToSelf
CryptReleaseContext
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextW
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
GetNamedSecurityInfoW
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateGuid
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoInitialize
OleLockRunning
CLSIDFromString
OleInitialize
CreateStreamOnHGlobal
CLSIDFromProgID
CoTaskMemAlloc
OleUninitialize
CoGetClassObject
CoCreateInstance
StringFromGUID2
CoTaskMemFree
OleRun
SysAllocStringLen
SysStringLen
SysAllocString
OleCreateFontIndirect
LoadTypeLi
VariantInit
VariantClear
VariantChangeType
SysAllocStringByteLen
VariantCopy
SysStringByteLen
DispCallFunc
LoadRegTypeLi
GetErrorInfo
SysFreeString
CertGetNameStringW
CertGetIssuerCertificateFromStore
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
WTHelperGetProvSignerFromChain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ