FreeLibraryMemoryAndExitThread
LdrUnloadDllMemoryAndExitThread
Static task
static1
Behavioral task
behavioral1
Sample
8d774adb4e1b1f5ff5b19927a029817fcbb5047d417155492caa817e34b677ff.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8d774adb4e1b1f5ff5b19927a029817fcbb5047d417155492caa817e34b677ff.exe
Resource
win10v2004-20231020-en
Target
8d774adb4e1b1f5ff5b19927a029817fcbb5047d417155492caa817e34b677ff
Size
15.0MB
MD5
1f2f58d0768a36078d2a5ce0697d0091
SHA1
6a9f1f3824c9b4ee52582ac0e13f6a8b01a16917
SHA256
8d774adb4e1b1f5ff5b19927a029817fcbb5047d417155492caa817e34b677ff
SHA512
14ccdf276dc27c8f6190f414147eb15723aa5558d0385fd0c8ff612c96a62c078976b993965b39894f37fe9afb6de7d95470db058358e76fd8a86cd38c8cc189
SSDEEP
196608:/FRE7NfdXlTmP0zNAV82x2E4mQIvnPmvM3l:/07JdXlTi0hAVt2dp0
Checks for missing Authenticode signature.
resource |
---|
8d774adb4e1b1f5ff5b19927a029817fcbb5047d417155492caa817e34b677ff |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
AcquireSRWLockExclusive
AcquireSRWLockShared
CancelIo
CancelIoEx
CloseHandle
CompareStringEx
CompareStringW
ConvertFiberToThread
ConvertThreadToFiberEx
CopyFileW
CreateEventA
CreateEventW
CreateFiberEx
CreateFileA
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateIoCompletionPort
CreateMutexW
CreatePipe
CreateProcessA
CreateProcessW
CreateSemaphoreA
CreateThread
CreateWaitableTimerA
CreateWaitableTimerW
DebugBreak
DecodePointer
DeleteCriticalSection
DeleteFiber
DeleteFileW
DeviceIoControl
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoEx
GetLocaleInfoW
GetLogicalProcessorInformation
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetQueuedCompletionStatus
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadContext
GetTickCount
GetTickCount64
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVolumeNameForVolumeMountPointW
GetVolumePathNamesForVolumeNameW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InitializeSRWLock
IsBadReadPtr
IsBadStringPtrA
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringEx
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MapViewOfFile
MapViewOfFileEx
MultiByteToWideChar
OpenEventA
OpenEventW
OpenFileMappingW
OpenMutexW
OpenProcess
OpenThread
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
QueueUserAPC
RaiseException
ReadConsoleA
ReadConsoleW
ReadFile
ReadProcessMemory
RegisterWaitForSingleObject
ReleaseMutex
ReleaseSRWLockExclusive
ReleaseSRWLockShared
ReleaseSemaphore
ResetEvent
ResumeThread
SetConsoleCtrlHandler
SetConsoleMode
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetFilePointerEx
SetLastError
SetStdHandle
SetThreadContext
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SleepConditionVariableSRW
SleepEx
SuspendThread
SwitchToFiber
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
UnmapViewOfFile
UnregisterWaitEx
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
WriteProcessMemory
lstrcmpA
LdrLockLoaderLock
LdrUnloadDll
LdrUnlockLoaderLock
NtAllocateVirtualMemory
NtClose
NtCreateFile
NtCreateSection
NtDeviceIoControlFile
NtFsControlFile
NtGetContextThread
NtMapViewOfSection
NtOpenSection
NtOpenSymbolicLinkObject
NtProtectVirtualMemory
NtQueryInformationProcess
NtQuerySymbolicLinkObject
NtQuerySystemInformation
NtQuerySystemTime
NtQueryVirtualMemory
NtReadVirtualMemory
NtResumeProcess
NtSuspendProcess
NtTerminateProcess
NtUnmapViewOfSection
NtWaitForSingleObject
NtWriteVirtualMemory
RtlAcquirePebLock
RtlAllocateHeap
RtlCaptureContext
RtlCompareMemory
RtlDosPathNameToNtPathName_U
RtlExitUserThread
RtlFreeHeap
RtlFreeUnicodeString
RtlGetNtVersionNumbers
RtlHashUnicodeString
RtlImageDirectoryEntryToData
RtlImageNtHeader
RtlInitUnicodeString
RtlLookupFunctionEntry
RtlNtStatusToDosError
RtlPcToFileHeader
RtlRaiseStatus
RtlReleasePebLock
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
RtlUnwind
RtlUnwindEx
RtlUpcaseUnicodeChar
RtlVirtualUnwind
ZwClose
ZwCreateSection
ZwLoadDriver
ZwMapViewOfSection
ZwOpenDirectoryObject
ZwOpenFile
ZwQueryAttributesFile
ZwQueryDirectoryObject
ZwQueryInformationFile
ZwQueryInformationThread
ZwUnloadDriver
ZwUnmapViewOfSection
CloseClipboard
CreateWindowExW
DefWindowProcW
DestroyIcon
DispatchMessageW
DrawIconEx
EmptyClipboard
FindWindowExW
FindWindowW
GetClipboardData
GetDC
GetDesktopWindow
GetForegroundWindow
GetMessageW
GetParent
GetProcessWindowStation
GetRawInputData
GetRawInputDeviceInfoW
GetSystemMetrics
GetUserObjectInformationW
GetWindow
GetWindowInfo
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
IsWindow
IsWindowVisible
MapVirtualKeyW
MessageBoxW
OpenClipboard
PostMessageW
PostQuitMessage
RealGetWindowClassW
RegisterClassExW
RegisterRawInputDevices
ReleaseDC
SendInput
SetTimer
SetWindowsHookExW
ShowWindow
TranslateMessage
UnregisterClassW
UpdateWindow
wsprintfW
AdjustTokenPrivileges
CloseServiceHandle
CloseTrace
ControlService
ControlTraceW
CreateServiceW
CryptAcquireContextW
CryptCreateHash
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
DeleteService
DeregisterEventSource
EnableTraceEx2
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
OpenTraceW
ProcessTrace
QueryServiceStatus
RegCloseKey
RegCreateKeyExW
RegCreateKeyW
RegDeleteKeyW
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegisterEventSourceW
ReportEventW
StartServiceW
StartTraceW
TraceSetInformation
UpdateTraceW
CLSIDFromString
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CreateStreamOnHGlobal
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateSolidBrush
DeleteDC
DeleteObject
GetBitmapBits
GetObjectW
SelectObject
ExtractIconExW
SHGetFolderPathW
SHGetSpecialFolderPathW
CM_Locate_DevNodeW
CM_Reenumerate_DevNode
SetupDiBuildDriverInfoList
SetupDiDestroyDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiEnumDeviceInfo
SetupDiEnumDeviceInterfaces
SetupDiEnumDriverInfoW
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDevicePropertyW
SetupDiGetDeviceRegistryPropertyW
SetupDiOpenDevRegKey
HidD_FreePreparsedData
HidD_GetAttributes
HidD_GetHidGuid
HidD_GetManufacturerString
HidD_GetPreparsedData
HidD_GetProductString
HidD_GetSerialNumberString
HidP_GetButtonCaps
HidP_GetCaps
HidP_GetValueCaps
D3D11CreateDevice
SafeArrayGetElement
SysAllocString
SysFreeString
SysStringLen
VariantClear
VariantInit
CertCloseStore
CertComparePublicKeyInfo
CertFindCertificateInStore
CertFindExtension
CertFreeCertificateContext
CertGetNameStringA
CertOpenStore
CryptBinaryToStringA
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
CryptMsgOpenToDecode
CryptMsgUpdate
CryptQueryObject
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WSAAddressToStringW
WSACleanup
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
WSAGetLastError
WSAIoctl
WSARecv
WSASend
WSASetLastError
WSASocketW
WSAStartup
WSAStringToAddressW
WSAWaitForMultipleEvents
__WSAFDIsSet
accept
bind
closesocket
connect
freeaddrinfo
getaddrinfo
gethostbyaddr
gethostbyname
getpeername
getservbyname
getservbyport
getsockname
getsockopt
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohl
ntohs
recv
recvfrom
select
send
sendto
setsockopt
shutdown
socket
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromGdiDib
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipDeleteGraphics
GdipDisposeImage
GdipDrawImageRectI
GdipFree
GdipGetImageGraphicsContext
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImageWidth
GdipSaveImageToStream
GdipSetInterpolationMode
GdiplusStartup
MiniDumpWriteDump
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
CryptCATCatalogInfoFromContext
WinVerifyTrust
mciSendCommandW
BCryptGenRandom
FreeLibraryMemoryAndExitThread
LdrUnloadDllMemoryAndExitThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ