GetHandleVerifier
IsSandboxedProcess
Static task
static1
Behavioral task
behavioral1
Sample
6d025ceb5d45841934758494cf65a089095bacc768363046df4dafc23287b5b2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6d025ceb5d45841934758494cf65a089095bacc768363046df4dafc23287b5b2.exe
Resource
win10v2004-20230915-en
Target
6d025ceb5d45841934758494cf65a089095bacc768363046df4dafc23287b5b2
Size
1.2MB
MD5
1a437ffc24ee13a242d1a1e13b157314
SHA1
2bac8310746f2023a7a807081572e990ec8b17b9
SHA256
6d025ceb5d45841934758494cf65a089095bacc768363046df4dafc23287b5b2
SHA512
b98ea779a2b7abc6827e483f3903a2b7aef89f0f06bf67ccf76a1d15ea9277792c0d71cad3f6ff09d6be581a573be45733f6b9217bdf556153f4bbd30c6ea357
SSDEEP
12288:jq+e48dJWBKlUgF1J0stz9o4D1DebecOMehHgSDv0e9+nK+kOFHZZ2+BGymQvq4:jqh4AXlU61JTw4DtebNehK5Z2KgQvq4
Checks for missing Authenticode signature.
resource |
---|
6d025ceb5d45841934758494cf65a089095bacc768363046df4dafc23287b5b2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SetHandleInformation
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
ExpandEnvironmentStringsW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
VirtualFreeEx
ReadProcessMemory
GetCurrentDirectoryW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
FreeLibrary
GetModuleHandleExW
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
HeapCreate
CreateMutexW
UnmapViewOfFile
GetCommandLineW
ReadFile
SetCurrentDirectoryW
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
SearchPathW
lstrlenW
DebugBreak
GetFileType
HeapFree
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SetEnvironmentVariableW
SwitchToThread
InitOnceExecuteOnce
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleOutputCP
RtlUnwind
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetThreadPriority
SetThreadPriority
GetThreadId
CloseHandle
RaiseException
GetModuleHandleW
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
IsWow64Process
GetNativeSystemInfo
GetProductInfo
GetVersionExW
GetTickCount
HeapDestroy
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DuplicateHandle
WaitForSingleObject
PostQueuedCompletionStatus
TerminateJobObject
RegisterWaitForSingleObject
UnregisterWait
SetEvent
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetCurrentProcess
SetProcessDEPPolicy
HeapSetInformation
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryW
HeapAlloc
GetModuleFileNameW
GetStringTypeW
LCMapStringEx
MultiByteToWideChar
DecodePointer
EncodePointer
InitializeCriticalSectionEx
WriteConsoleW
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
CloseDesktop
CloseWindowStation
GetThreadDesktop
GetUserObjectInformationW
EventWriteTransfer
EventUnregister
EventRegister
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
CoTaskMemFree
PathRemoveFileSpecW
PathAppendW
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE