Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
rename (2).exe
Resource
win11-20240802-en
Target
rename (2).exe
Size
1.6MB
MD5
2192b5059195d40c7a737bcfcc04abb2
SHA1
1d103964af1ab922252ce1091e906abdebb024b7
SHA256
7cb991b1ecf41a669ad9cf31bf882f9eb3e31381b757c073fccc4e57a224caba
SHA512
628d6eb048ad3b9fd4c0c1a31415b7b9e6edb6f1b560e02894ab3de397193d895e1d9c7dd735dd54fab101d4d5b97b96000369328df3f926877502a4e41187e2
SSDEEP
12288:wp7vRsqy57qrWFsmQ3HUdUyxWKZPKv8y0yx2sYfFNbuyG:U7v4UN3HUWpQSvQPdZu3
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
OneDrive.pdb
SetEvent
MultiByteToWideChar
VerSetConditionMask
VerifyVersionInfoW
PostQueuedCompletionStatus
GetQueuedCompletionStatus
ReadDirectoryChangesW
CreateIoCompletionPort
CreateFileW
OpenFileById
GetFinalPathNameByHandleW
CompareStringOrdinal
GetFileAttributesW
GetExitCodeProcess
ExpandEnvironmentStringsW
SetLastError
ReadConsoleW
ReadFile
SetEndOfFile
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
CreateEventExW
IsValidCodePage
FindNextFileW
IsWow64Process
GetUserDefaultLCID
GetCommandLineW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetCurrentProcess
GetSystemTimeAsFileTime
WaitForSingleObject
TerminateProcess
GetCurrentProcessId
Sleep
OpenProcess
GetModuleHandleW
MoveFileW
CloseHandle
CreateProcessW
CopyFileW
GetModuleHandleExW
FreeLibrary
GetProcAddress
LoadLibraryW
SetDllDirectoryW
GetModuleFileNameW
LocalFree
DeleteCriticalSection
DecodePointer
RaiseException
FindFirstFileExW
FindClose
GetTimeZoneInformation
SetStdHandle
EnumSystemLocalesW
WriteConsoleW
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFullPathNameW
GetCurrentDirectoryW
WriteFile
GetStdHandle
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
GetLastError
GetACP
InitializeCriticalSectionEx
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
GetStringTypeW
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
GetWindowThreadProcessId
PostMessageW
EnumWindows
GetClassNameW
EventWriteTransfer
EventUnregister
FreeSid
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
RegEnumKeyW
RegCreateKeyTransactedW
EventRegister
RegEnumValueW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegDeleteValueW
RegDeleteKeyExW
RegDeleteTreeW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegGetValueW
RegSetKeyValueW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SHFileOperationW
SHChangeNotify
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetKnownFolderPath
CommandLineToArgvW
ord526
CoTaskMemFree
StringFromGUID2
CoWaitForMultipleHandles
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoUninitialize
CoInitialize
LoadTypeLi
LoadRegTypeLi
SysAllocString
GetRecordInfoFromTypeInfo
SysFreeString
RollbackTransaction
CommitTransaction
CreateTransaction
SHGetValueW
PathFileExistsW
SHRegGetBoolUSValueW
PathIsPrefixW
InternetCanonicalizeUrlW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ