Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ProduKey.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ProduKey.exe
Resource
win10v2004-20240802-en
Target
ProduKey.exe
Size
128KB
MD5
8c1c2a6e66e0769380b878a0f3ab6208
SHA1
b2b31abc767f29d5bc961c95b87ee167613f00d9
SHA256
92392bd287c748f7da0c5ca8aa394f44d6980f0efdd276cf34d7adbd12ddfd6f
SHA512
8e082aaf8c1fa42e8c30ab10dd72fc3d869448b36d8853877972d7a89e490f432e5ef307e98723a98da650973a680d0734ed0dacc71c5478e7025bfbf4571b67
SSDEEP
3072:I5wYR6wga1nr9oH8OCpaCBXq5jK+hs6sTG9e+yO:nEgsFmCCurTYL
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource | yara_rule |
---|---|
sample | Nirsoft |
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\Projects\VS2005\ProduKey\x64\Release\ProduKey.pdb
WNetOpenEnumA
WNetCloseEnum
WNetEnumResourceA
_exit
_cexit
exit
_acmdln
_purecall
qsort
_strlwr
_itoa
_c_exit
strtoul
strchr
_memicmp
strcmp
malloc
??2@YAPEAX_K@Z
??3@YAXPEAX@Z
_strnicmp
_XcptFilter
__C_specific_handler
__dllonexit
_onexit
free
_mbsicmp
strrchr
_strcmpi
_stricmp
memcpy
strlen
atof
memcmp
atoi
memset
strcpy
strncat
sprintf
strcat
__getmainargs
_initterm
__setusermatherr
_commode
_fmode
__set_app_type
ImageList_Create
CreateToolbarEx
ord6
ImageList_AddMasked
ImageList_SetImageCount
ord17
ImageList_ReplaceIcon
gethostbyname
WSACleanup
WSAStartup
WSAAsyncSelect
gethostbyaddr
closesocket
WSASetLastError
htons
WSAGetLastError
connect
OpenProcess
ResumeThread
CreateThread
ExitProcess
GetCurrentProcessId
ReadProcessMemory
SetErrorMode
DeleteFileA
GetStdHandle
GetPrivateProfileIntA
GetStartupInfoA
GetModuleFileNameA
FindNextFileA
GetLastError
EnumResourceNamesA
WritePrivateProfileStringA
MultiByteToWideChar
WriteFile
GetDateFormatA
GetWindowsDirectoryA
FindClose
GetSystemDirectoryA
GetTempFileNameA
ReadFile
FormatMessageA
LoadLibraryExA
GetDriveTypeA
WideCharToMultiByte
GetPrivateProfileStringA
Sleep
GetCurrentProcess
CompareFileTime
GetLogicalDrives
GetComputerNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleHandleA
GlobalAlloc
GetVersionExA
GlobalUnlock
GlobalLock
CloseHandle
CreateFileA
GetFileSize
GetTempPathA
GetTimeFormatA
FindFirstFileA
LocalFree
GetFileAttributesA
RegisterWindowMessageA
GetMessageA
DispatchMessageA
GetWindowTextA
GetMenuItemInfoA
EndDeferWindowPos
DestroyWindow
CreateDialogParamA
DestroyMenu
GetDlgCtrlID
DialogBoxParamA
LoadStringA
GetFocus
KillTimer
TrackPopupMenu
BeginDeferWindowPos
PostQuitMessage
EnumChildWindows
SetTimer
IsDialogMessageA
DeferWindowPos
LoadCursorA
ShowWindow
SetCursor
ChildWindowFromPoint
ReleaseDC
GetDC
GetSysColorBrush
SetDlgItemTextA
GetDlgItemTextA
SetWindowTextA
SendDlgItemMessageA
GetDlgItemInt
EndDialog
GetDlgItem
CreateWindowExA
SetDlgItemInt
SendMessageA
RegisterClassA
UpdateWindow
GetSystemMetrics
GetWindowRect
PostMessageA
SetMenu
LoadAcceleratorsA
SetWindowPos
DefWindowProcA
TranslateAcceleratorA
MessageBoxA
GetWindowPlacement
LoadImageA
LoadIconA
GetWindowLongA
SetWindowLongA
InvalidateRect
SetFocus
EmptyClipboard
GetClassNameA
MoveWindow
EnableMenuItem
CloseClipboard
GetSubMenu
CheckMenuItem
GetMenuItemCount
GetClientRect
CheckMenuRadioItem
GetMenuStringA
GetCursorPos
SetClipboardData
ModifyMenuA
EnableWindow
GetSysColor
MapWindowPoints
GetMenu
GetParent
OpenClipboard
LoadMenuA
TranslateMessage
GetTextExtentPoint32A
SetBkColor
GetStockObject
SetBkMode
DeleteObject
SetTextColor
GetDeviceCaps
CreateFontIndirectA
GetOpenFileNameA
FindTextA
GetSaveFileNameA
RegQueryInfoKeyA
RegConnectRegistryA
RegLoadKeyA
RegUnLoadKeyA
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteExA
CoInitialize
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ