Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
Resource
win10v2004-20240802-en
Target
40122c3fc307277bbcb516dce390f74f27e2f798cb351.exe
Size
5.6MB
MD5
07dd73909e1a74b92498058afc918ede
SHA1
2f3f9ab4f17ccd2dfe0c4aada522b00c580c454d
SHA256
40122c3fc307277bbcb516dce390f74f27e2f798cb351a692f820ba7d3ffd735
SHA512
97f66cd575203cfbd0d584475c6696b160071e95466e5dde8b71d66138108f0b4d544af24706720960509fd7fd21bef07e443995457de3805168672844901853
SSDEEP
98304:XUd9wETbKHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+oEIWoJd:MwgbKM44YCxwxmzLOFfdrq+P/xnCoEIh
Processes:
resource | yara_rule |
---|---|
sample | family_hijackloader |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\FastCopy\src\install\Obj\ReleaseInst\setup.pdb
ReadFile
FindFirstFileW
FindNextFileW
WriteFile
FindClose
WaitForSingleObject
CreateFileW
DeleteFileW
CloseHandle
GetLocalTime
GetFileSize
GetSystemTimeAsFileTime
CreateDirectoryW
GetCommandLineW
GetFullPathNameW
RemoveDirectoryW
GetModuleFileNameW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
CreateProcessW
FreeLibrary
CopyFileW
SetDllDirectoryW
MoveFileW
GetEnvironmentVariableW
VirtualProtect
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetTempPathW
Sleep
GetLastError
SetEvent
GetVersionExA
DeleteCriticalSection
GetModuleHandleW
GetEnvironmentStringsW
GetStdHandle
WriteConsoleA
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
InterlockedIncrement
GetTickCount
SetThreadLocale
SetLastError
GetCurrentProcess
GetSystemDirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
GetUserDefaultLCID
Process32FirstW
LoadLibraryW
GetCurrentProcessId
MultiByteToWideChar
MoveFileExW
WideCharToMultiByte
ExitProcess
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MapViewOfFile
GetFileTime
GetModuleFileNameA
SetEndOfFile
RaiseException
CreateThread
SetUnhandledExceptionFilter
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
HeapReAlloc
IsValidLocale
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
ReadConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ