Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
8737a598aa00cbf1b6329b33e3c22e3c21a079675a7fc9e97498438ccf50152a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8737a598aa00cbf1b6329b33e3c22e3c21a079675a7fc9e97498438ccf50152a.exe
Resource
win10v2004-20241007-en
Target
8737a598aa00cbf1b6329b33e3c22e3c21a079675a7fc9e97498438ccf50152a.exe
Size
595KB
MD5
7d46dd928aed03380e3f8eb9c44a9497
SHA1
c8718a550fd9a3a4c63a036b6cd19f9294232eeb
SHA256
8737a598aa00cbf1b6329b33e3c22e3c21a079675a7fc9e97498438ccf50152a
SHA512
bc0c1252e070bff3d9be3debb3ee563961a1e65463763cf7e8a8477fc841560187a848f51d8fc36ec52cf01ab46fc4e96dac9c806d3f26a65676ea55980c3109
SSDEEP
12288:RqFwpkDPhijh2Z1MVM9aWmHd/1Uk496YKQFM8a4VCY:RqFwqThijh2/5Ux1+r9TRaACY
resource | yara_rule |
---|---|
sample | family_neshta |
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryW
ReadFile
GetModuleFileNameW
CreateFileW
GetTempPathW
GetFileSizeEx
GetProcAddress
FindClose
IsWow64Process
FindNextFileW
ExpandEnvironmentStringsW
FreeResource
SetFilePointer
SetEndOfFile
SetStdHandle
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetLastError
GetStringTypeW
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
LoadLibraryExW
ExitThread
CreateThread
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TlsFree
WriteFile
GetCurrentProcess
FreeLibrary
FindFirstFileW
GetTempFileNameW
MultiByteToWideChar
WideCharToMultiByte
LockResource
SizeofResource
LoadResource
FindResourceW
FormatMessageW
GetModuleHandleW
DeleteFileW
RemoveDirectoryW
CopyFileW
CreateDirectoryW
LocalFree
CloseHandle
ReleaseMutex
DecodePointer
FreeLibraryAndExitThread
HeapSize
VerifyVersionInfoW
RaiseException
Sleep
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapFree
InitializeCriticalSection
VerSetConditionMask
HeapAlloc
CreateMutexW
HeapReAlloc
GetCommandLineW
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
EncodePointer
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
WaitForSingleObject
DuplicateHandle
MoveFileExW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetFileType
WriteConsoleW
SetWindowLongW
ReleaseDC
GetWindowLongW
RegisterClassExW
IsDialogMessageW
TranslateMessage
GetDC
LoadCursorW
MapWindowPoints
DefWindowProcW
RedrawWindow
DispatchMessageW
GetDesktopWindow
UnregisterClassW
GetMessageW
GetWindowRect
LoadIconW
LoadImageW
CharLowerA
EnumDisplaySettingsW
MonitorFromPoint
SetWindowTextW
SendMessageW
GetSysColor
GetDlgItem
SetWindowPos
EnumChildWindows
ShowWindow
CreateWindowExW
PostMessageW
MessageBoxW
GetWindowTextW
GetClientRect
TrackMouseEvent
GetParent
GetWindowTextLengthW
DrawTextW
FillRect
CharLowerW
CharUpperW
DestroyIcon
SetForegroundWindow
SetTimer
KillTimer
MapDialogRect
FindWindowW
PostQuitMessage
SetClassLongW
ShowScrollBar
ClientToScreen
DestroyWindow
EnableWindow
MoveWindow
DrawIconEx
EndPaint
SetCapture
GetFocus
SetFocus
BeginPaint
LockWindowUpdate
SetCursorPos
GetCursorPos
GetSysColorBrush
ReleaseCapture
GetSystemMetrics
UpdateWindow
SetCursor
ShowCursor
DestroyCursor
IsWindowEnabled
GetDlgCtrlID
StretchBlt
SetStretchBltMode
CreatePen
GetBkMode
SetBkColor
GetBkColor
GetTextColor
SetTextColor
CreateFontIndirectW
CreateSolidBrush
AddFontMemResourceEx
GetDeviceCaps
GetStockObject
GetDIBits
SetDIBits
BitBlt
DeleteDC
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
RemoveFontMemResourceEx
RegEnumValueW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegDeleteKeyW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
CoUninitialize
PathIsURLW
AssocQueryStringW
PathMatchSpecW
PathFileExistsW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ord410
ord413
ord412
InitCommonControlsEx
UuidToStringW
RpcStringFreeW
UuidCreate
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipAlloc
GdipLoadImageFromFileICM
GdipFree
GdiplusStartup
GdiplusShutdown
GdipGetImageWidth
GdipSetInterpolationMode
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectRectI
GdipGetImageHeight
GradientFill
AlphaBlend
timeKillEvent
timeSetEvent
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetCrackUrlW
HttpQueryInfoA
InternetOpenW
InternetGetLastResponseInfoW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ