TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
2c7f334360054e7245f26fe64936914f.exe
Resource
win7-20230220-en
Target
2c7f334360054e7245f26fe64936914f.bin
Size
2.7MB
MD5
2c7f334360054e7245f26fe64936914f
SHA1
c282c46683bc2bca047e2bce28149efd6e963b26
SHA256
062ba92736257f6ec1f16e33a8ae507732ab900404785d5f14b05cf4cecd05c2
SHA512
311ec05a42304df1440d5686ebcefa66a97847d20bf979423a4fe37f8aec4dc2b1fc7b4fb622f0dfc4ade68e814ae6100bbe06d182e1ed6ed24499b7d44ec964
SSDEEP
24576:8utqlCvhJW+cxVF4Y8+IEZ+8NCLn7Zpc1J83Q+KLM7nOV2D2Ldl/yXBH2UaEcGNL:95vREyQon7SOnMZlUH2EcGN/qeJN
Checks for missing Authenticode signature.
resource |
---|
2c7f334360054e7245f26fe64936914f.bin |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetACP
LocalFree
CloseHandle
SizeofResource
VirtualProtect
QueryPerformanceFrequency
IsDebuggerPresent
FindNextFileW
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
FileTimeToLocalFileTime
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
FileTimeToDosDateTime
ReadFile
CreateProcessW
HeapSize
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
LoadLibraryA
ResetEvent
GetVolumeInformationW
MulDiv
FreeResource
GetDriveTypeW
GetVersion
RaiseException
MoveFileW
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
PeekNamedPipe
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
WritePrivateProfileStringW
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
GetSystemInfo
GetCommandLineW
GetTempPathW
DuplicateHandle
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetWindowsDirectoryW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
lstrlenW
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
GetSystemDirectoryW
DeleteFileW
GetLocalTime
GetEnvironmentVariableW
WaitForSingleObject
WriteFile
ExitThread
CreatePipe
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
GetPrivateProfileStringW
SetThreadLocale
GetThreadLocale
WSAStartup
WSACleanup
gethostbyname
gethostname
inet_ntoa
SHGetFileInfoW
SHGetSpecialFolderPathW
IsEqualGUID
CoCreateInstance
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
DrawTextExW
CharLowerBuffW
PeekMessageW
GetSystemMetrics
MessageBoxW
GetSysColor
CopyIcon
CharUpperBuffW
DrawIconEx
MsgWaitForMultipleObjects
FrameRect
OemToCharA
DestroyIcon
GetIconInfo
GetDesktopWindow
FillRect
GetClipboardData
CharUpperW
LoadIconW
GetWindowRect
DrawFocusRect
CharNextW
GetDC
LoadStringW
CreateIcon
ReleaseDC
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
memcpy
memset
NetWkstaGetInfo
NetApiBufferFree
RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
GetUserNameW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegQueryValueExW
RegEnumValueW
RegCloseKey
RegCreateKeyExW
RegRestoreKeyW
Arc
Pie
SetBkMode
SelectPalette
CreateCompatibleBitmap
GetEnhMetaFileHeader
MaskBlt
AngleArc
DeleteEnhMetaFile
Chord
SetTextColor
StretchBlt
SetDIBits
RealizePalette
SetDIBColorTable
GetDIBColorTable
RoundRect
GetTextMetricsW
GetWindowOrgEx
CreatePalette
CreateBrushIndirect
PatBlt
SetEnhMetaFileBits
CreateDCW
PolyBezierTo
GetStockObject
Polygon
Rectangle
MoveToEx
DeleteDC
PlayEnhMetaFile
BitBlt
Ellipse
GetDeviceCaps
GetBitmapBits
GetTextExtentPoint32W
GetClipBox
Polyline
GetSystemPaletteEntries
GetEnhMetaFileBits
CreateBitmap
SetWinMetaFileBits
CreateDIBitmap
GetStretchBltMode
CreateDIBSection
CreatePenIndirect
SetStretchBltMode
GetEnhMetaFilePaletteEntries
GetDIBits
CreateFontIndirectW
PolyBezier
LineTo
CreateHalftonePalette
DeleteObject
SelectObject
ExtFloodFill
UnrealizeObject
CopyEnhMetaFileW
SetBkColor
CreateCompatibleDC
GetObjectW
GetBrushOrgEx
GetWinMetaFileBits
GetCurrentPositionEx
SetROP2
ExtTextOutW
SetBrushOrgEx
GetEnhMetaFileDescriptionW
GetPixel
ArcTo
GdiFlush
SetPixel
GetPaletteEntries
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ