Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
EDa0JKVgKZayN3vH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
dControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
guide.pdf
Resource
win10v2004-20241007-en
Target
EDa0JKVgKZayN3vH.zip
Size
26.5MB
MD5
84924b275034b9dcc5330ad6fe841393
SHA1
3b05a08a007e2aec32dc581c2989c4a249e04ab6
SHA256
ec7c97c7f8bea5e4d29c65a5a8bbeb2e5e6c40eacaaad47bf095b935ce5511f3
SHA512
a5c8abe817abfa9153ae728f502bc2726307d67cadd5b41688012757800ffd7c1a0ea74ded21fcbf755995113547d907ac5a62e755f2eae55255705fe0ee9ba5
SSDEEP
786432:mdkt/3a73MAZ5EjdwiJKWVcH2Qb8BXz7QG:mS/JAZ5ywiJ03aXAG
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | autoit_exe |
resource | yara_rule |
---|---|
static1/unpack001/dControl.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/EDa0JKVgKZayN3vH.exe |
unpack002/out.upx |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RtlAddFunctionTable
D3D11CreateDeviceAndSwapChain
GetCurrentProcess
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetCursor
CreateCompatibleDC
QueryServiceStatus
ShellExecuteExA
CreateStreamOnHGlobal
D3DCompile
??0facet@locale@std@@IEAA@_K@Z
D3DX11CreateShaderResourceViewFromMemory
ImmSetCandidateWindow
URLDownloadToFileA
GdipAlloc
InternetOpenA
__CxxFrameHandler4
memmove
setvbuf
qsort
isalnum
_set_new_mode
terminate
strtoll
sinf
remove
_configthreadlocale
getenv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
https://content.overwolf.com/downloads/setup/latest/regular.html
https://emojipedia.org/euro-banknote
https://emojipedia.org/fire
https://emojipedia.org/hundred-points
https://emojipedia.org/tongue
https://medal.tv/