Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_2d92ae9909310fd111b72ccdcb967810_eternalromance_magniber_qakbot_revil_sliver.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_2d92ae9909310fd111b72ccdcb967810_eternalromance_magniber_qakbot_revil_sliver.exe
Resource
win10v2004-20240802-en
Target
2024-10-04_2d92ae9909310fd111b72ccdcb967810_eternalromance_magniber_qakbot_revil_sliver
Size
43.5MB
MD5
2d92ae9909310fd111b72ccdcb967810
SHA1
4dffec955b9659351e3dc2a5ab26e623d236a864
SHA256
f758c82117323caa927c8f307db678a72f55c31b976bf00e98ddba1a03f36574
SHA512
eb48ffddebc81796ffe581e61f3ce691f5a3018e6d4c1b1d35dd87671a0f07f5c135adec9bc6fba52567d4680335ef2b667115d614be39f73702067970e3d4c2
SSDEEP
786432:L8olWI6Jx30Lw4HlcDQ0Lwhraq4fkGe7MwMD6u6P95C9OaoO9DQFg5:L8olWI6JR0LHSxLkaqAegw46Z3a5Q2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EntSetup32.pdb
DeregisterEventSource
RegisterEventSourceA
ReportEventA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
CryptEnumProvidersA
CryptSignHashA
GetUserNameA
CloseServiceHandle
DeleteService
OpenSCManagerA
OpenServiceA
CryptDestroyHash
CryptCreateHash
SetFileSecurityA
ConvertStringSecurityDescriptorToSecurityDescriptorA
AllocateAndInitializeSid
FreeSid
SetEntriesInAclA
SetNamedSecurityInfoA
StartServiceA
CryptDecrypt
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegGetValueW
RegOpenKeyExW
RegSetValueExW
RegSetKeySecurity
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegGetKeySecurity
SetEntriesInAclW
SetSecurityDescriptorGroup
MakeSelfRelativeSD
GetSecurityDescriptorLength
InitializeSecurityDescriptor
IsValidSecurityDescriptor
SetSecurityDescriptorSacl
GetSecurityDescriptorControl
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
CryptExportKey
CryptGetUserKey
CryptGenRandom
CryptAcquireContextW
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
GetSecurityInfo
GetTokenInformation
InitiateSystemShutdownA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegConnectRegistryA
RegDeleteKeyA
PathAddExtensionA
PathFileExistsA
PathRemoveFileSpecA
PathAppendA
ord141
ord112
ord15
ord204
PropertySheetA
ImageList_Create
ImageList_Add
InitCommonControlsEx
ord17
shutdown
send
recv
closesocket
inet_ntoa
WSAGetLastError
WSAAddressToStringA
WSAStringToAddressA
getaddrinfo
freeaddrinfo
WSASetLastError
GetModuleFileNameExA
CertGetCertificateContextProperty
CertFreeCertificateContext
CertDuplicateCertificateContext
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
VerifyVersionInfoW
SystemTimeToFileTime
MultiByteToWideChar
GlobalAlloc
GlobalUnlock
GlobalLock
GetPrivateProfileStringA
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
DeviceIoControl
InitializeCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
GetTickCount
MulDiv
GetLocaleInfoA
OutputDebugStringA
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFileTime
SetEndOfFile
SetFileAttributesA
EnterCriticalSection
LeaveCriticalSection
TerminateThread
ResumeThread
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
MoveFileA
VirtualAlloc
VirtualFree
GetCurrentProcessId
GetCurrentProcess
Sleep
IsWow64Process
LocalFree
SetErrorMode
GlobalFree
RemoveDirectoryA
TerminateProcess
OpenProcess
GetWindowsDirectoryA
WinExec
MoveFileExA
GetCurrentThreadId
EndUpdateResourceA
GetCommandLineW
ExpandEnvironmentStringsA
CreateDirectoryA
ExitProcess
GetSystemWow64DirectoryA
CreateSemaphoreA
OpenSemaphoreA
WideCharToMultiByte
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
CreateFileW
SetFilePointerEx
GetModuleFileNameW
GetModuleHandleW
ProcessIdToSessionId
CreateProcessW
GetExitCodeProcess
FlushFileBuffers
CreateMutexW
ReleaseMutex
LocalAlloc
GetLocalTime
CreateDirectoryW
CreateToolhelp32Snapshot
DuplicateHandle
GetComputerNameA
CreateEventW
ResetEvent
QueryPerformanceCounter
CreateFileMappingW
FormatMessageA
GetSystemTimeAsFileTime
LockFileEx
UnlockFile
HeapDestroy
HeapCompact
LoadLibraryW
GetSystemInfo
HeapReAlloc
WaitForSingleObjectEx
FlushViewOfFile
OutputDebugStringW
GetDiskFreeSpaceA
FormatMessageW
HeapSize
HeapValidate
GetTempPathW
UnlockFileEx
GetFullPathNameA
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
TryEnterCriticalSection
LocalReAlloc
GetACP
CreateMutexA
VirtualProtect
Process32First
Process32Next
GetThreadPriority
LoadResource
LockResource
SizeofResource
FindResourceA
GetComputerNameW
GetDateFormatA
GetTimeFormatA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
SetLastError
LoadLibraryExA
GlobalSize
lstrcmpA
lstrcmpiA
IsDBCSLeadByte
FindFirstFileW
FindNextFileW
GetStdHandle
GetFileType
FlushConsoleInputBuffer
GlobalMemoryStatus
GetConsoleWindow
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetCPInfo
EncodePointer
CopyFileA
RtlUnwind
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
UpdateResourceA
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
VirtualQuery
TzSpecificLocalTimeToSystemTime
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetConsoleCtrlHandler
WriteConsoleW
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
ReadConsoleInputA
BeginUpdateResourceA
lstrlenA
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
GetSystemDirectoryA
GetSystemTime
CreateProcessA
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
CloseHandle
GetTempFileNameA
GetTempPathA
WriteFile
SetFileTime
SetFilePointer
ReadFile
GetFileSize
GetDriveTypeA
DeleteFileA
CreateFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
VerSetConditionMask
CreatePipe
SetConsoleMode
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetCurrentDirectoryW
GetCommandLineA
EnumDisplaySettingsA
GetUserObjectInformationW
LoadStringA
LoadIconA
DrawFocusRect
RegisterClassA
PostQuitMessage
GetMessageA
KillTimer
SetTimer
GetKeyState
UpdateWindow
IsDialogMessageA
SetForegroundWindow
IsWindow
PeekMessageA
DispatchMessageA
TranslateMessage
LoadImageA
LoadBitmapA
GetClassNameA
SetParent
GetSysColorBrush
ScreenToClient
GetWindowRect
ReleaseDC
CreateDialogParamA
SetWindowPos
MoveWindow
MessageBeep
GetClipboardData
EnumWindows
IsWindowVisible
GetCursor
SetCursor
MapVirtualKeyExA
GetKeyNameTextA
GetKeyboardLayout
IsWindowEnabled
GetDlgItemInt
SetDlgItemInt
GetWindowTextLengthA
GetClassInfoExA
RegisterWindowMessageA
wsprintfW
GetProcessWindowStation
GetWindowTextA
SendDlgItemMessageA
EndDialog
DialogBoxParamA
GetWindowThreadProcessId
MapVirtualKeyA
VkKeyScanW
GetClassLongA
GetParent
LoadCursorA
FillRect
GetSysColor
RemovePropA
GetPropA
SetPropA
RedrawWindow
InvalidateRect
EndPaint
BeginPaint
GetDC
EndDeferWindowPos
BeginDeferWindowPos
PtInRect
SetRect
ReleaseCapture
SetCapture
GetCapture
GetFocus
DeferWindowPos
ClientToScreen
EnableMenuItem
DestroyWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
UnregisterClassA
wsprintfA
CheckRadioButton
SetWindowLongA
GetWindowLongA
GetCursorPos
SetWindowTextA
TrackPopupMenu
AppendMenuA
WinHelpA
GetTopWindow
GetDesktopWindow
DestroyMenu
CreatePopupMenu
SetFocus
EmptyClipboard
RegisterClipboardFormatA
SetClipboardData
CloseClipboard
OpenClipboard
CallWindowProcA
PostMessageA
GetAsyncKeyState
GetDlgItemTextA
SendMessageA
SetDlgItemTextA
EnableWindow
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
ShowWindow
OffsetRect
MessageBoxA
GetClientRect
GetForegroundWindow
DrawTextA
GetSystemMenu
CloseWindow
EnumDisplayMonitors
GetWindow
CharPrevA
AdjustWindowRectEx
InvalidateRgn
DestroyAcceleratorTable
CreateAcceleratorTableA
GetSystemMetrics
IsChild
CharNextA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
CreatePatternBrush
CreateDCA
SetMapMode
StretchBlt
GetObjectA
DPtoLP
GetTextExtentPointA
TranslateCharsetInfo
CreateBitmap
GetStockObject
GetMapMode
MoveToEx
LineTo
GetTextExtentPoint32A
GetDeviceCaps
CreateSolidBrush
CreatePen
CreateFontA
SetTextColor
SetBkMode
SetBkColor
SelectObject
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
GetSaveFileNameA
GetOpenFileNameA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationA
SHCreateDirectoryExA
CommandLineToArgvW
ShellExecuteA
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitializeSecurity
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
OleInitialize
OleUninitialize
CoSetProxyBlanket
CoCreateGuid
CoGetClassObject
CoTaskMemFree
CoInitializeEx
CLSIDFromProgID
CreateStreamOnHGlobal
OleLockRunning
StringFromCLSID
SysStringLen
SysAllocString
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
SysAllocStringLen
VariantChangeType
VariantCopy
VariantClear
VariantInit
SysFreeString
URLDownloadToFileA
InternetGetConnectedState
InternetAttemptConnect
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
GetSetupVersion
OPENSSL_Applink
VerifySetupInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ