ZZLaunchExplorer
ZZLaunchExplorerDelayed
ZZRestartExplorer
ZZTestBalloon
ZZTestToast
Static task
static1
Behavioral task
behavioral1
Sample
ep_setup (1).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ep_setup (1).exe
Resource
win10v2004-20230220-en
Target
ep_setup (1).exe
Size
1.8MB
MD5
0022ad8082b815bc30182e748fecf80c
SHA1
88af03747655d367a6221af7507ce77780940cc1
SHA256
1e19a17d39755f8094fd34398b41b8de81534e662f0daa17c5fb9496e3db49f9
SHA512
3247fa42ff4e9ac7bbd1427b78decf3e3cec17256ea457c08abb323f4a207d0f7a5dbc1d0830e2ff70367ee790e5b57d03ce98c6d56f0757b1b647ab10d6059d
SSDEEP
24576:da+at0fognSgflZ8LgGzC7OGDIi4x9vItzOSK/oig/dA5BaYm/qKe:M6foHg9yC7Oh9iatR4cclyK
Checks for missing Authenticode signature.
resource |
---|
ep_setup (1).exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetProcessTimes
GetExitCodeProcess
FindFirstFileW
SetLastError
WriteFile
FindClose
CreateThread
GetCurrentDirectoryW
GetProcAddress
FreeLibrary
CopyFileW
CreateSymbolicLinkW
MoveFileW
LoadLibraryExW
WriteConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
ReadConsoleW
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
MultiByteToWideChar
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileType
GetModuleHandleW
CreateProcessW
GetCurrentProcessId
LocalFree
GetWindowsDirectoryW
FindResourceW
LoadResource
FreeConsole
CloseHandle
DeleteFileW
LockResource
GetLastError
Sleep
CreateEventW
OpenProcess
FreeResource
GetSystemDirectoryW
GetCurrentThreadId
CreateFileW
LocalAlloc
WaitForSingleObject
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
GetFileSizeEx
SizeofResource
ReadFile
WideCharToMultiByte
CreateDirectoryW
HeapFree
HeapAlloc
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlPcToFileHeader
RaiseException
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TranslateMessage
wsprintfW
LoadCursorW
DefWindowProcW
ExitWindowsEx
DispatchMessageW
RegisterClassExW
FindWindowW
SetProcessDpiAwarenessContext
SendMessageTimeoutW
SendMessageW
LoadStringW
GetWindowThreadProcessId
GetMessageW
MessageBoxW
CreateWindowExW
LoadIconW
RevertToSelf
EqualSid
AllocateAndInitializeSid
RegDeleteKeyValueW
RegCreateKeyExW
CreateProcessWithTokenW
ImpersonateLoggedOnUser
RegDeleteTreeW
RegSetValueExW
FreeSid
CheckTokenMembership
DuplicateTokenEx
RegOpenKeyW
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
OpenProcessToken
RegOpenKeyExW
RegGetValueW
CryptGetHashParam
RegQueryValueExW
CryptReleaseContext
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
Shell_NotifyIconW
SHFileOperationW
CommandLineToArgvW
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
RmGetList
RmStartSession
RmShutdown
RmRestart
RmRegisterResources
RmEndSession
WindowsDeleteString
WindowsCreateStringReference
RoGetActivationFactory
RoInitialize
RoActivateInstance
VerQueryValueW
GetProcessImageFileNameW
EnumProcesses
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
PathRemoveExtensionW
PathFileExistsW
PathStripPathW
PathRemoveFileSpecW
ZZLaunchExplorer
ZZLaunchExplorerDelayed
ZZRestartExplorer
ZZTestBalloon
ZZTestToast
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ