CopyDBFile
DecodeUSB
EnCodeUSB
Static task
static1
Behavioral task
behavioral1
Sample
107a43e530bfcbaade0253b648401474a4bb861a6e26a1deef17f34cc85f7f64.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
107a43e530bfcbaade0253b648401474a4bb861a6e26a1deef17f34cc85f7f64.dll
Resource
win10v2004-20230703-en
Target
107a43e530bfcbaade0253b648401474a4bb861a6e26a1deef17f34cc85f7f64
Size
487KB
MD5
1bf4fbdf3a4401d10783bda1c0631cee
SHA1
c8f658152db0394ef290f885f2db8c0df2c8e891
SHA256
107a43e530bfcbaade0253b648401474a4bb861a6e26a1deef17f34cc85f7f64
SHA512
af59160da84a77adbfcd5e843abe8a599088aaaaf70b00d08691346041c277e7481f6943d2bf2f3d5b2131690ccdbee3774eec18ed2571c156864a3245af7ac5
SSDEEP
6144:GATzLSVqHIZ9Wm1rTSDAZddCULmbwoJGooDcyp0vQ93jAxEWv1gmpM:GeLSVTEmN+mr3Lm8oJGo27kgm
Checks for missing Authenticode signature.
resource |
---|
107a43e530bfcbaade0253b648401474a4bb861a6e26a1deef17f34cc85f7f64 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LoadStringW
MessageBoxA
CharNextW
MessageBoxW
LoadStringW
CharUpperW
CharNextW
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
Sleep
VirtualFree
VirtualAlloc
GetACP
GetSystemInfo
GetTickCount
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualFree
Sleep
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResetEvent
ReleaseSemaphore
ReleaseMutex
ReadFile
LocalLock
LocalFree
LoadLibraryA
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalAlloc
GetVersionExW
GetTickCount
GetThreadLocale
GetStdHandle
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLogicalDriveStringsA
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesW
GetDriveTypeA
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcess
GetCPInfoExW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
FindFirstFileW
FindClose
EnumSystemLocalesW
EnumCalendarInfoW
EnterCriticalSection
DeviceIoControl
DeleteCriticalSection
CreateSemaphoreA
CreateMutexA
CreateFileA
CreateFileW
CreateEventW
CopyFileW
CompareStringW
CloseHandle
Sleep
lstrcpyA
HidD_GetPreparsedData
HidD_GetAttributes
HidD_FreePreparsedData
HidP_GetCaps
HidD_GetFeature
HidD_SetFeature
HidD_GetHidGuid
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
ib_util_malloc
CopyDBFile
DecodeUSB
EnCodeUSB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ