JDuCS622tuL6
MkcDIl34k3Si
PcYge9j
eOXScagadNKe
Static task
static1
Behavioral task
behavioral1
Sample
01d770a3b3eba8a2b76f2861885f6c9ef034303609d6c29c967a3afe7d02744f.dll
Resource
win10v2004-20230220-en
Target
01d770a3b3eba8a2b76f2861885f6c9ef034303609d6c29c967a3afe7d02744f
Size
1.2MB
MD5
b18c3a2086816c400282406ee76fda1b
SHA1
a5844dbf281ca097b2fb76e3bfbf566fabe7b3f5
SHA256
01d770a3b3eba8a2b76f2861885f6c9ef034303609d6c29c967a3afe7d02744f
SHA512
b121f0fde3339778df7657e8bc60c9207aa29d89f60a4b78a3458538224634eb84115c91ac7e41ec75ca1d4c7d4ea4b3505908691c737a44404b263f375264f7
SSDEEP
24576:ln+5EYhtdpUjD+2c7nwn5tI3194JLGPpxR4kY7CefCv9F2STtIekpb0:SV0Fe3WMd4ks1ezTtps0
Checks for missing Authenticode signature.
resource |
---|
01d770a3b3eba8a2b76f2861885f6c9ef034303609d6c29c967a3afe7d02744f |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetProcessHeap
CreateFileA
CloseHandle
GetLastError
HeapWalk
CreateFiber
SwitchToFiber
CreateActCtxA
ActivateActCtx
DeactivateActCtx
OpenThread
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetModuleFileNameA
GetModuleHandleA
GetCurrentProcessId
GetFileInformationByHandle
CreateFileMappingA
VirtualAlloc
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetLastError
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsSetValue
FreeLibrary
LoadLibraryExW
CompareStringW
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
ExitProcess
GetModuleHandleExW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapReAlloc
RtlUnwindEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
JDuCS622tuL6
MkcDIl34k3Si
PcYge9j
eOXScagadNKe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ