GetHostInterface
MdCallBack
MdCallBack12
ksGetHWND
wdGetApplicationObject
Static task
static1
Behavioral task
behavioral1
Sample
cef0ad8aa0e592exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
cef0ad8aa0e592exeexeexeex.exe
Resource
win10v2004-20230703-en
Target
cef0ad8aa0e592exeexeexeex.exe
Size
1.5MB
MD5
cef0ad8aa0e59245a308d5563ae6b409
SHA1
a3b98649b573ee177645f4b5617f7a465c9e2fdb
SHA256
8d156a15d82ab034d4949df4873bd5608878573b4cfb65407e62ffa955714e96
SHA512
fcd62dd3848a190273064fda1e58e1e7725b15c8dbff5c89b3762a512c62a37a287da9d542d4bb3fbae11dd27764bd7bea139fd76080dad40e7b90cb9e86eb37
SSDEEP
24576:1/3BlDla/Yu1npfVf/fPGWGbcFctm6qB+1FZicEd8X+bWHXmLQjcm+bP:lDla//nWbcFSPqB6ZiTS+bYXmLQAHbP
Checks for missing Authenticode signature.
resource |
---|
cef0ad8aa0e592exeexeexeex.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
CloseHandle
GetLastError
GetCurrentProcessId
TerminateProcess
OpenProcess
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryW
OutputDebugStringW
DecodePointer
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateProcessW
FindResourceExW
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
LocalFree
CopyFileW
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
VerSetConditionMask
CreateFileW
GetFileAttributesExW
ReadFile
WaitForSingleObject
SetDllDirectoryW
VerifyVersionInfoW
SetEvent
CreateEventW
Sleep
GetExitCodeProcess
GetCurrentThreadId
GetSystemTime
SystemTimeToFileTime
CreateThread
GetSystemDirectoryA
LoadLibraryA
ReleaseMutex
OpenMutexW
GetTickCount
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetPrivateProfileStringW
CreateMutexW
VirtualQuery
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
QueueUserWorkItem
UnregisterWaitEx
FlushFileBuffers
WriteFile
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetNamedPipeHandleState
WaitNamedPipeW
GetOverlappedResult
CancelIo
GetCurrentProcess
LocalAlloc
SetUnhandledExceptionFilter
GetProcessId
LoadLibraryExW
SetErrorMode
GetModuleHandleExW
VirtualAlloc
VirtualFree
GetSystemInfo
GetFileAttributesW
GetTempPathW
GetStartupInfoW
GetDllDirectoryW
CreateDirectoryW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
SetEndOfFile
WriteConsoleW
SetStdHandle
VirtualProtect
LoadLibraryExA
CompareFileTime
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetEnvironmentVariableW
lstrlenW
GetPrivateProfileIntW
GetUserDefaultUILanguage
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetCompressedFileSizeW
ReleaseSemaphore
CreateSemaphoreW
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
FreeLibraryAndExitThread
InterlockedPushEntrySList
RtlUnwind
GetCommandLineA
ExitThread
SetConsoleCtrlHandler
GetStdHandle
ExitProcess
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
?_force_link_krpt@@YGXXZ
GetHostInterface
MdCallBack
MdCallBack12
ksGetHWND
wdGetApplicationObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE