GetHandleVerifier
IsSandboxedProcess
Static task
static1
Behavioral task
behavioral1
Sample
487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474.exe
Resource
win10v2004-20230703-en
Target
9ebc7dd20fa66f5deabfd8873a4ed8c6.bin
Size
759KB
MD5
b8272689a1a6d30ff1fbdc41a17125b5
SHA1
1b0b41f287d47aed0ec2ce568e3a180ffab6d31a
SHA256
2733639cd5b9c6bcd0c51e8c23119845da2e640377869e0afdfae054067bb126
SHA512
fb34b024641bcab0dc6679ebe511b7a5a1b87195aad6c80972f2a46208a22470823060cbff1aa8f249f2f95c344ae2b02cf1b6d953b11c2feed43a0799e07c3a
SSDEEP
12288:R0bBAvr3S5ko2rE68qTUkC2zHJm4KGI8lOUQxuacMXr6R/CSNvuyPYYOv4VUaqD+:R0bKzi5he2OE4rLgUQxuaRXMJdPpycUq
Checks for missing Authenticode signature.
resource |
---|
unpack001/487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474.bin |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SignalChromeElf
GetInstallDetailsPayload
ImpersonateNamedPipeClient
SetEntriesInAclW
GetSecurityInfo
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
SystemFunction036
EventRegister
EventUnregister
EventWrite
RevertToSelf
RegDisablePredefinedCache
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
GetKernelObjectSecurity
GetAce
SetKernelObjectSecurity
DuplicateTokenEx
EqualSid
CreateProcessAsUserW
SetThreadToken
CreateRestrictedToken
DuplicateToken
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
GetThreadLocale
GetSystemDefaultLCID
GetCurrentThreadId
GetModuleFileNameW
CreateEventW
GetLastError
SetLastError
GetCurrentProcess
DuplicateHandle
GetProcessId
WaitForSingleObject
GetCurrentDirectoryW
SetCurrentDirectoryW
LoadLibraryExW
GetProcAddress
SetProcessShutdownParameters
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineW
LocalFree
GetModuleHandleW
GetSystemTimeAsFileTime
ReleaseSRWLockExclusive
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
GetCurrentThread
GetThreadPriority
SetThreadPriority
Sleep
LoadLibraryW
GetModuleHandleA
ExpandEnvironmentStringsW
CloseHandle
DeleteFileW
OutputDebugStringA
WriteFile
CreateFileW
GetCurrentProcessId
GetLocalTime
GetTickCount
FormatMessageA
OpenProcess
TerminateProcess
GetExitCodeProcess
SetFilePointerEx
ReadFile
GetFileSizeEx
SetEndOfFile
SetFileTime
GetFileInformationByHandle
FlushFileBuffers
HeapCreate
HeapDestroy
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
VirtualQuery
IsDebuggerPresent
RaiseException
CreateThread
GetThreadId
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetVersionExW
GetNativeSystemInfo
GetFileAttributesW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
ReplaceFileW
CreateDirectoryW
GetTempPathW
GetLongPathNameW
QueryDosDeviceW
GetSystemDirectoryW
GetWindowsDirectoryW
UnregisterWaitEx
RegisterWaitForSingleObject
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsGetValue
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessTimes
GetModuleHandleExW
GetUserDefaultLangID
FreeLibrary
FindClose
FindNextFileW
FindFirstFileExW
SetEnvironmentVariableW
GetEnvironmentVariableW
FlushViewOfFile
TlsAlloc
TlsFree
TlsSetValue
IsWow64Process
SwitchToThread
CreateIoCompletionPort
PostQueuedCompletionStatus
SetInformationJobObject
GetQueuedCompletionStatus
VirtualQueryEx
GetSystemInfo
HeapSetInformation
ResetEvent
SetEvent
VirtualProtect
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
InitializeCriticalSectionAndSpinCount
DecodePointer
CreateProcessW
GetTimeZoneInformation
CreateSemaphoreW
ReleaseSemaphore
OutputDebugStringW
LockFileEx
UnlockFileEx
GetFileType
GetStdHandle
SetConsoleCtrlHandler
VirtualAllocEx
TerminateJobObject
GetUserDefaultLCID
ProcessIdToSessionId
SetHandleInformation
AssignProcessToJobObject
WriteProcessMemory
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
VirtualProtectEx
ReadProcessMemory
VirtualFreeEx
CreateNamedPipeW
CreateRemoteThread
CreateJobObjectW
CreateMutexW
SearchPathW
lstrlenW
DebugBreak
LoadLibraryExA
GetThreadContext
SuspendThread
TransactNamedPipe
SetNamedPipeHandleState
WaitNamedPipeW
DisconnectNamedPipe
ConnectNamedPipe
GetFileInformationByHandleEx
GetVersion
SleepEx
SetFilePointer
GetThreadTimes
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
IsValidLocale
ResumeThread
ReadConsoleW
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
PeekNamedPipe
GetDriveTypeW
GetACP
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetStringTypeW
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitOnceExecuteOnce
GetProcessMemoryInfo
GetPerformanceInfo
QueryWorkingSetEx
SHGetKnownFolderPath
SHGetFolderPathW
CommandLineToArgvW
PathMatchSpecW
RegisterClassW
PostThreadMessageW
PeekMessageW
SetProcessDPIAware
GetMessageW
GetUserObjectInformationW
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
CreateWindowStationW
GetProcessWindowStation
CloseWindowStation
CloseDesktop
wsprintfW
UnregisterClassW
DefWindowProcW
SetWindowLongW
GetWindowLongW
CreateWindowExW
DestroyWindow
RegisterClassExW
DispatchMessageW
TranslateMessage
PostQuitMessage
MsgWaitForMultipleObjectsEx
GetQueueStatus
SetTimer
PostMessageW
KillTimer
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
timeBeginPeriod
timeGetTime
timeEndPeriod
WinHttpSetTimeouts
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpWriteData
WinHttpReadData
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpCrackUrl
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ