JDuCS622tuL6
MkcDIl34k3Si
PcYge9j
eOXScagadNKe
Static task
static1
Behavioral task
behavioral1
Sample
4b43cacaa34fe27bf575a332efbab32e44f5971d70135f9094a344afe38cbe30.dll
Resource
win10-20230220-en
Target
4b43cacaa34fe27bf575a332efbab32e44f5971d70135f9094a344afe38cbe30
Size
1.2MB
MD5
9ec2f8af7618ed2aaf1618a7ad88df9f
SHA1
8ebc131b8459acf80fbbffd1661d21cd5a61384b
SHA256
4b43cacaa34fe27bf575a332efbab32e44f5971d70135f9094a344afe38cbe30
SHA512
f0adde166ce4affce97a6d60050f2e3d3322feda19c74a66ca3964d84f3f12a3172797aaf1f43e2f87e38e27ba6e8f1552a8fe0ef4efacf5b6cc02df0e4696b8
SSDEEP
24576:OSqXRxnyx/JQw1Gj4Q68Z9Op8Ve6V7dkiVEYJFqpQHTbBsrSOJra7M5oJ:O5I3EU+sWVdV7dk6US4ag2J
Checks for missing Authenticode signature.
resource |
---|
4b43cacaa34fe27bf575a332efbab32e44f5971d70135f9094a344afe38cbe30 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetProcessHeap
CreateFileA
CloseHandle
GetLastError
HeapWalk
CreateFiber
SwitchToFiber
CreateActCtxA
ActivateActCtx
DeactivateActCtx
OpenThread
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetModuleFileNameA
GetModuleHandleA
GetCurrentProcessId
GetFileInformationByHandle
CreateFileMappingA
VirtualAlloc
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetLastError
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsSetValue
FreeLibrary
LoadLibraryExW
CompareStringW
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
ExitProcess
GetModuleHandleExW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapReAlloc
RtlUnwindEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
JDuCS622tuL6
MkcDIl34k3Si
PcYge9j
eOXScagadNKe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ