?KBHookProc@@YGJHIJ@Z
?MSHookProc@@YGJHIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
8dbf12b7093f4066b0c98ce3fdfb3460_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8dbf12b7093f4066b0c98ce3fdfb3460_exe32.exe
Resource
win10v2004-20230915-en
Target
8dbf12b7093f4066b0c98ce3fdfb3460_exe32.exe
Size
92KB
MD5
8dbf12b7093f4066b0c98ce3fdfb3460
SHA1
afbec632ff50ebd38a19b02a8defabe4edc381cf
SHA256
574a61f1656df20f72a93d7db4491343b58d221d87b65ef9a789fad6a488f4c2
SHA512
43dde8cc08f00d0a3abcb0f44c0f6f6fcbfa76024826cd2ed301ec51f0e44d1335efaa69ca744e5fce0bce41da2bea6b0227376b817a527c34e39dc2fd3cb300
SSDEEP
1536:2SM1JxeNbcQ1PwNjTADvWsiLECtCARzI1A80gCnJRN8SdA:GqNbss2ECtCsk1N9CJA
Checks for missing Authenticode signature.
resource |
---|
8dbf12b7093f4066b0c98ce3fdfb3460_exe32.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MulDiv
ReadFile
CreateFileW
GlobalUnlock
GlobalFree
LockResource
CloseHandle
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
GetLocaleInfoA
lstrcpynW
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
WideCharToMultiByte
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameW
GetModuleFileNameA
GetStdHandle
SizeofResource
GlobalAlloc
WriteFile
GlobalLock
LoadResource
Sleep
FindResourceW
ExitProcess
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
GetLastError
MultiByteToWideChar
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
GetForegroundWindow
EndPaint
DrawAnimatedRects
DestroyWindow
keybd_event
SetCursor
TranslateAcceleratorW
GetSystemMenu
SetTimer
GetWindowRect
GetMessageW
PostQuitMessage
TrackPopupMenu
LoadImageW
SetForegroundWindow
LoadCursorW
CallNextHookEx
GetClientRect
SendMessageA
BeginPaint
PtInRect
TranslateMessage
DispatchMessageW
LoadAcceleratorsW
IsDialogMessageW
AppendMenuW
GetClassNameW
GetDlgItem
SetWindowLongW
GetDesktopWindow
GetSysColor
SetWindowPos
GetCursorPos
ShowWindow
CreatePopupMenu
CreateDialogParamW
FindWindowExW
InsertMenuW
SetWindowsHookExW
UnhookWindowsHookEx
MessageBoxW
GetSystemMetrics
IsWindowVisible
SendMessageW
DestroyMenu
SetWindowTextW
DestroyIcon
CallWindowProcW
CreateFontIndirectW
GetDeviceCaps
SetBkMode
GetObjectW
CreateSolidBrush
SetTextColor
ShellExecuteW
Shell_NotifyIconW
CreateStreamOnHGlobal
OleLoadPicture
?KBHookProc@@YGJHIJ@Z
?MSHookProc@@YGJHIJ@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE