Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c.exe
Resource
win10v2004-20240802-en
Target
a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c.exe
Size
5.6MB
MD5
0ba52a085647724ae6b56e29bab4af6e
SHA1
1ee26f6cb803f456ba019ebae8eb818f0e48a962
SHA256
a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c
SHA512
3e134ccc89d9c7ad7921cbcce9ff139e2ce0f9cb10471c5410215a331dd7ad4bda365cb8f4369e5a8200c7662a31126b4a8e9de354e1c5df5093a5740f93d645
SSDEEP
98304:UUd9YlH/tdi0YUxHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+oEIW2:5Y51E0YUxM44YCxwxmzLOFfdrq+P/xnF
resource | yara_rule |
---|---|
sample | family_hijackloader |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\FastCopy\src\install\Obj\ReleaseInst\setup.pdb
ReadFile
FindFirstFileW
FindNextFileW
WriteFile
FindClose
WaitForSingleObject
CreateFileW
DeleteFileW
CloseHandle
GetLocalTime
GetFileSize
GetSystemTimeAsFileTime
CreateDirectoryW
GetCommandLineW
GetFullPathNameW
RemoveDirectoryW
GetModuleFileNameW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
CreateProcessW
FreeLibrary
CopyFileW
SetDllDirectoryW
MoveFileW
GetEnvironmentVariableW
VirtualProtect
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetTempPathW
Sleep
GetLastError
SetEvent
GetVersionExA
DeleteCriticalSection
GetModuleHandleW
GetEnvironmentStringsW
GetStdHandle
WriteConsoleA
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
InterlockedIncrement
GetTickCount
SetThreadLocale
SetLastError
GetCurrentProcess
GetSystemDirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
GetUserDefaultLCID
Process32FirstW
LoadLibraryW
GetCurrentProcessId
MultiByteToWideChar
MoveFileExW
WideCharToMultiByte
ExitProcess
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MapViewOfFile
GetFileTime
GetModuleFileNameA
SetEndOfFile
RaiseException
CreateThread
SetUnhandledExceptionFilter
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
HeapReAlloc
IsValidLocale
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
ReadConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ