Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
6060f895bdcce0406aa5cd2c2e300d906e118727e87fb4fe470eaf8e538cb5c8N.dll
Resource
win7-20240903-en
Target
6060f895bdcce0406aa5cd2c2e300d906e118727e87fb4fe470eaf8e538cb5c8N
Size
1.1MB
MD5
a0d05fb866619f79443d0b5a9fc02af0
SHA1
9b2caf0212692af92027cd5289639981c0676658
SHA256
6060f895bdcce0406aa5cd2c2e300d906e118727e87fb4fe470eaf8e538cb5c8
SHA512
38d1abc895ae0c7c3106fd159dc3b104a4dc9eade2e59a4272f68ca037b0000feba6c110cdfb56ee5d3f489775bbd3f23619d177f0f4d077209c4935c545cd02
SSDEEP
24576:UePxdXzBFPhgR19+QfJFlZErehEr6mmvfxrEH7y:UKvXruR1NrtmmnR
resource | yara_rule |
---|---|
sample | upx |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
DuplicateHandle
GetProcessId
GetProcAddress
GetModuleHandleA
VirtualAlloc
CompareStringW
GetThreadLocale
GlobalGetAtomNameW
GetModuleFileNameW
CompareStringA
GlobalGetAtomNameA
InterlockedExchange
GetThreadContext
CloseHandle
OpenProcess
GetSystemWindowsDirectoryW
GetTempPathW
GetFileAttributesW
LocalFree
GetCommandLineW
GetFileSize
GetSystemTimeAsFileTime
GetFileInformationByHandle
CreateFileW
Sleep
DeviceIoControl
CreateEventW
CancelIo
ReadFile
WriteFile
SetFilePointer
InterlockedIncrement
DeleteFileW
MoveFileW
SetFileAttributesW
GetFileTime
WaitForSingleObject
FindClose
RemoveDirectoryW
FindNextFileW
FindFirstFileW
OutputDebugStringW
OutputDebugStringA
GetLocalTime
WideCharToMultiByte
ReleaseMutex
SetEvent
InterlockedDecrement
CreateMutexW
LoadLibraryA
InterlockedCompareExchange
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
SetNamedPipeHandleState
WaitNamedPipeW
VirtualProtectEx
InitializeCriticalSectionAndSpinCount
GetComputerNameA
VerSetConditionMask
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentDirectoryW
FlushFileBuffers
GetCurrentThreadId
GetTickCount
MultiByteToWideChar
SetLastError
GetModuleHandleW
GetEnvironmentVariableW
GetLastError
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentProcessId
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetStdHandle
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TerminateProcess
VirtualProtect
ResumeThread
FlushInstructionCache
SetThreadContext
SuspendThread
GetCurrentThread
VirtualQueryEx
LoadLibraryExW
LoadLibraryExA
RtlUnwind
GetCommandLineA
GetVersion
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
ExitProcess
GetModuleFileNameExW
EnumProcessModules
GetModuleInformation
IsTextUnicode
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetWindowThreadProcessId
GetSystemMetrics
ToUnicode
inet_ntoa
getsockopt
WSASetLastError
htons
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
SysFreeString
SysAllocString
CommandLineToArgvW
StringFromGUID2
CoTaskMemFree
StringFromCLSID
PathIsNetworkPathW
1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ