Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
eabab52bcbe87f613c30876e05d790757f27470b161f9e3fa7932acbecac63af.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
eabab52bcbe87f613c30876e05d790757f27470b161f9e3fa7932acbecac63af.dll
Resource
win10v2004-20230703-en
Target
eabab52bcbe87f613c30876e05d790757f27470b161f9e3fa7932acbecac63af
Size
56KB
MD5
3020437ab7ec3112f5c268533af522e4
SHA1
b09427586600376a2dc439f623f4ce83ce989e41
SHA256
eabab52bcbe87f613c30876e05d790757f27470b161f9e3fa7932acbecac63af
SHA512
85bcce63089da1e1e4d7062b407bfcc2fc09d078ab22d2983cb3e738d8f97b9ff05e5c9d9068ee1f37feb58eab933cc01115b62a9318c72995d80a78f1777442
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x56OVrYklJq:oyUuAC6xopRbIjYH
Checks for missing Authenticode signature.
resource |
---|
eabab52bcbe87f613c30876e05d790757f27470b161f9e3fa7932acbecac63af |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ