??0CDrCallTracer@@QEAA@KQEBD0PEBJ@Z
??1CDrCallTracer@@QEAA@XZ
?LogMessage@CDrCallTracer@@QEAAXKPEADZZ
Static task
static1
Behavioral task
behavioral1
Sample
diskraid.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
diskraid.exe
Resource
win10v2004-20230703-en
Target
diskraid.exe
Size
330KB
MD5
e7de148c2d2b431c2069874c766f68eb
SHA1
61e2ef5743a912f57ff41e983e1bfde8a82d0dc2
SHA256
7d4c3d063e8da3250b94a3c81edad89ed3ac218228ea177c3576590a42d027b6
SHA512
352a733d5418b210eeac37d5a339a882395efd5b7407cd0f595a769b0a3aa46e057fca5509cb8797063100980b9895d48a225dea3eb6448eeddebe4854fac862
SSDEEP
6144:39KZruydrGIPoaP1SLkWPEiBEo4SPujg:39K0ydKadPoEj
Checks for missing Authenticode signature.
resource |
---|
diskraid.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
EventSetInformation
EventRegister
EventWriteTransfer
EventUnregister
Sleep
WideCharToMultiByte
lstrcmpiW
GetCurrentThreadId
GetCurrentProcessId
SetConsoleCtrlHandler
GetStdHandle
GetModuleFileNameW
SetThreadUILanguage
GetConsoleMode
GetLastError
HeapSetInformation
GetLocalTime
GetComputerNameW
GetFileType
RegisterApplicationRestart
WriteFile
LocalAlloc
FormatMessageW
WriteConsoleW
LocalFree
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
memcpy
__iob_func
?terminate@@YAXXZ
_commode
_fmode
__C_specific_handler
_initterm
__setusermatherr
_cexit
_exit
__set_app_type
__wgetmainargs
_XcptFilter
malloc
free
setvbuf
_wfopen
_wtoi
fclose
_wcsicmp
setlocale
exit
fprintf
_vsnprintf
_wtol
_vsnwprintf
_wcsnicmp
fgetwc
_amsg_exit
memset
RtlCaptureContext
RtlIpv6AddressToStringExW
RtlLookupFunctionEntry
RtlVirtualUnwind
LoadStringW
WSACleanup
WSAAddressToStringW
htons
WSAStartup
VerQueryValueW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitializeEx
StringFromGUID2
??0CDrCallTracer@@QEAA@KQEBD0PEBJ@Z
??1CDrCallTracer@@QEAA@XZ
?LogMessage@CDrCallTracer@@QEAAXKPEADZZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ