Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
63826a55c4068856273858fd7537d57543df7d713426866d9b8df566ccbe8f35.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63826a55c4068856273858fd7537d57543df7d713426866d9b8df566ccbe8f35.exe
Resource
win10v2004-20241007-en
Target
63826a55c4068856273858fd7537d57543df7d713426866d9b8df566ccbe8f35
Size
5.6MB
MD5
4d93ef870fb716fc1b3e05548d41d528
SHA1
ae2d44dfb6ad8a7d1e38d7b7f368ffa4763265c9
SHA256
63826a55c4068856273858fd7537d57543df7d713426866d9b8df566ccbe8f35
SHA512
b00184c4fa30d6d9ae8e7365925ecfa2d87c22e21ef609bc2ce135d998668da79671d2839508674ad638859b35af38f14d3752ec767b5cbc4a8c292e011c57fe
SSDEEP
98304:UUd9FTuBYxHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+oEIWoJd:5FTnM44YCxwxmzLOFfdrq+P/xnCoEIW2
resource | yara_rule |
---|---|
sample | family_hijackloader |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\FastCopy\src\install\Obj\ReleaseInst\setup.pdb
ReadFile
FindFirstFileW
FindNextFileW
WriteFile
FindClose
WaitForSingleObject
CreateFileW
DeleteFileW
CloseHandle
GetLocalTime
GetFileSize
GetSystemTimeAsFileTime
CreateDirectoryW
GetCommandLineW
GetFullPathNameW
RemoveDirectoryW
GetModuleFileNameW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
CreateProcessW
FreeLibrary
CopyFileW
SetDllDirectoryW
MoveFileW
GetEnvironmentVariableW
VirtualProtect
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetTempPathW
Sleep
GetLastError
SetEvent
GetVersionExA
DeleteCriticalSection
GetModuleHandleW
GetEnvironmentStringsW
GetStdHandle
WriteConsoleA
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
InterlockedIncrement
GetTickCount
SetThreadLocale
SetLastError
GetCurrentProcess
GetSystemDirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
GetUserDefaultLCID
Process32FirstW
LoadLibraryW
GetCurrentProcessId
MultiByteToWideChar
MoveFileExW
WideCharToMultiByte
ExitProcess
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MapViewOfFile
GetFileTime
GetModuleFileNameA
SetEndOfFile
RaiseException
CreateThread
SetUnhandledExceptionFilter
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
HeapReAlloc
IsValidLocale
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
ReadConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ