@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
Newtest.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Newtest.exe
Resource
win10v2004-20230703-en
Target
Newtest.exe
Size
144KB
MD5
a8c5296a2a6e12fe042e72c7ab5989ee
SHA1
650580347d69b6c17e28fa1c34d222e56be06904
SHA256
0d67169501df6972d21fa9eefc8b36170e8177ae700f246a290436b4f5f1cb4a
SHA512
2bbd4f22fd2049f2d6e48050c1da798ab6ff5bd3a64d8c7a86d32031cece6ccf8343ca2a9ca762a178cbbc012626f07b55c99c7f8a23bacce496cb0d95a7278f
SSDEEP
768:lpNL2ObnMdMJmuFSaqTDSs0oO120Q8vCKGQsebubCfvFmzHO2Xhm9zyYUdJZAJRx:3skMdMJ9FSVUHKKGINwaW0yYUdJOj9
Checks for missing Authenticode signature.
resource |
---|
Newtest.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualAlloc
UnhandledExceptionFilter
WriteFile
VirtualFree
GetStdHandle
GlobalFree
GetStartupInfoA
IsDBCSLeadByte
ExitProcess
FindResourceA
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
EnterCriticalSection
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
FreeResource
GetCommandLineA
GetVersion
CloseHandle
CreateFileA
GetEnvironmentStrings
GlobalMemoryStatus
GlobalHandle
CreateProcessA
InitializeCriticalSection
LoadResource
LeaveCriticalSection
GetFileType
LockResource
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SizeofResource
SleepEx
RegOpenKeyExA
SetSecurityDescriptorDacl
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
StretchDIBits
SetStretchBltMode
SelectPalette
RealizePalette
CreatePalette
LoadCursorA
GetDesktopWindow
GetClientRect
EnumThreadWindows
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
LoadStringA
BeginPaint
wsprintfA
UpdateWindow
ShowWindow
SetWindowTextA
RegisterClassA
PostQuitMessage
WaitForInputIdle
PeekMessageA
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE