__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe
Resource
win10v2004-20230915-en
Target
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe
Size
949KB
MD5
970b25a5d4b08da3326cae9ed1d3d6a0
SHA1
8ba10febec796e351b4c4f07d31100b7598db2d0
SHA256
2917996cbcfddf131682a0079bdecf56585ce5e763a2830b9dbcd59ae8b696dc
SHA512
2269f35db0c06a27600d2f943b7d439876a32c7c94a8ed30ab42bd53d67af9e30f0e46f1018d90ad2fab2a4d90e5b279e0027df92bef1a00a5fd33eff366972f
SSDEEP
12288:JHnmchMRsL9KpgyzvFxKVpBehwU3p35Dg:1nFMo9KphcVpBehw4g
Checks for missing Authenticode signature.
resource |
---|
2917996CBCFDDF131682A0079BDECF56585CE5E763A2830B9DBCD59AE8B696DC.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
ReleaseMutex
SetFilePointer
GetACP
LocalFree
CloseHandle
SuspendThread
VirtualProtect
GetTickCount
QueryPerformanceFrequency
IsDebuggerPresent
GetFullPathNameW
VirtualFree
GetProcessHeap
HeapAlloc
GetStartupInfoW
ExitProcess
InitializeCriticalSection
GetCPInfoExW
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
RtlUnwind
GetCPInfo
GetSystemInfo
GetCommandLineW
ResumeThread
GetProcAddress
LeaveCriticalSection
EnumSystemLocalesW
GetStdHandle
GetVersionExW
VerifyVersionInfoW
GetModuleHandleW
FreeLibrary
HeapCreate
HeapDestroy
ReadFile
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
GetUserDefaultUILanguage
FindFirstFileW
SetLastError
GetModuleFileNameW
GetLastError
lstrlenW
SetEndOfFile
CompareStringW
QueryPerformanceCounter
CreateThread
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
CreateMutexW
LoadLibraryW
LoadLibraryA
ResetEvent
SetEvent
CreateFileW
GetLocaleInfoW
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetLocalTime
OutputDebugStringW
WaitForSingleObject
GetCurrentThread
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
IsBadReadPtr
TlsGetValue
IsValidLocale
TlsSetValue
LoadLibraryExW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
CreateEventW
VirtualQueryEx
GetThreadLocale
SetThreadLocale
Sleep
htons
connect
setsockopt
WSAStartup
inet_addr
WSACleanup
send
closesocket
recv
socket
GetMessageW
IsWindow
TranslateMessage
CharLowerBuffW
CharUpperW
PeekMessageW
GetSystemMetrics
SetTimer
MessageBoxW
KillTimer
CharUpperBuffW
CharNextW
MsgWaitForMultipleObjects
LoadStringW
FindWindowW
DispatchMessageW
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ