RD_XXXX
StormPlayer_WinMain
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.312708960b8c355f3570b782bcf78270.dll
Resource
win7-20230831-en
Target
NEAS.312708960b8c355f3570b782bcf78270.exe
Size
2.3MB
MD5
312708960b8c355f3570b782bcf78270
SHA1
31b667e4f2f7822d5a9e2e8bd0596443b4fbc93b
SHA256
8d22edac359a66d44eefe736aa8a375a3617a24c33b859f559ae5ace7f861bf3
SHA512
b868417138ed88ad05296fac33f4380eded9a1295f42582db1a1d96ffbb64906d484fb07460eedc987177161a8e380e2b9d9911b910f52065e8509384cd18480
SSDEEP
6144:9wcsZ2ruVxaMJESXJddzQFGZoa8SRl+/aJGioydxfMbyhIY8sw:9wcs/xZESPdCGZ18oxG2xn
Checks for missing Authenticode signature.
resource |
---|
NEAS.312708960b8c355f3570b782bcf78270.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
LoadLibraryA
GetCurrentThreadId
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetModuleFileNameW
VirtualQuery
FreeLibrary
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapValidate
IsBadReadPtr
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapSize
HeapReAlloc
VirtualAlloc
WriteFile
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LCMapStringA
LCMapStringW
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
RD_XXXX
StormPlayer_WinMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ