Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
885424059f99a57297b9d04f3b283c5f2406df0a734e2b99161e0bff1be96e85.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
885424059f99a57297b9d04f3b283c5f2406df0a734e2b99161e0bff1be96e85.exe
Resource
win10v2004-20240802-en
Target
885424059f99a57297b9d04f3b283c5f2406df0a734e2b99161e0bff1be96e85
Size
10KB
MD5
0b02611c9de6f0c2d704348a34af5e90
SHA1
46910f3b62875e95e2cfb6fbe1ede2a5a32a0f1a
SHA256
885424059f99a57297b9d04f3b283c5f2406df0a734e2b99161e0bff1be96e85
SHA512
0f2e51accbf3a889ad957a91deac7b464d58330b0b856b5291e4afe59f72cf6108138efe0d2164b24eb8c4b156dd0f71f0298d4f84d4e2d8368ebe6171cea83c
SSDEEP
192:j+ijQcT7F2nwTjOLhRJ6zr77E5pz6rJoZZJx2QqgHaZawQ/d:j+KQcvEnCjKhGf77mzv2QIod
metasploit
windows/reverse_tcp
192.168.0.102:4444
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
__current_exception
_except_handler4_common
__current_exception_context
memset
_initialize_onexit_table
_register_onexit_function
_register_thread_local_exe_atexit_callback
_controlfp_s
terminate
_exit
_get_initial_narrow_environment
exit
_c_exit
_cexit
_initialize_narrow_environment
_configure_narrow_argv
__p___argc
_set_app_type
_seh_filter_exe
__p___argv
_initterm_e
_crt_atexit
_initterm
__setusermatherr
_set_fmode
__p__commode
_configthreadlocale
_set_new_mode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ