launch_v0
launch_v10
launch_v100
launch_v11
launch_v12
Static task
static1
Behavioral task
behavioral1
Sample
8d5021c53121c89dc484c87604dfe88dd44ff652fa5ae834e9f63c09f5b8fd8e.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8d5021c53121c89dc484c87604dfe88dd44ff652fa5ae834e9f63c09f5b8fd8e.dll
Resource
win10v2004-20231020-en
Target
8d5021c53121c89dc484c87604dfe88dd44ff652fa5ae834e9f63c09f5b8fd8e
Size
95KB
MD5
1e498ae28bd7b2f626baa76570973cc3
SHA1
19aa0a494d82011e3b38fe96b6abc26f3b883dee
SHA256
8d5021c53121c89dc484c87604dfe88dd44ff652fa5ae834e9f63c09f5b8fd8e
SHA512
11d8c110d430f53e518d73052bcd5002a4add3c8870e4f4e361f0e0fa4bb8fbe5a57a8a7ff0058d688d27d82200322a6b4c347a4f8ba31772b6107ee19c28c94
SSDEEP
1536:RgcDQ+t1bwRNqMRO1WN88450USVn9mCqY/veT1jmFCc:acDxt1bMROMN8RXSFqY/veT1jS
Checks for missing Authenticode signature.
resource |
---|
8d5021c53121c89dc484c87604dfe88dd44ff652fa5ae834e9f63c09f5b8fd8e |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
fread
strncpy
remove
fopen
_rmdir
_mkdir
strncmp
abort
strtok
_time64
__pctype_func
tolower
_errno
strtol
_initterm
_iob
___lc_handle_func
___lc_codepage_func
_lock
_unlock
_isatty
fflush
_fileno
?terminate@@YAXXZ
ceil
log10
_clearfp
strrchr
memcpy
memset
__C_specific_handler
memmove
__CxxFrameHandler
fclose
rand
atoi
malloc
_callnewh
_strrev
_CxxThrowException
free
CryptStringToBinaryA
CryptBinaryToStringA
CryptImportPublicKeyInfo
CryptDecodeObjectEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleExW
GetModuleHandleW
EnterCriticalSection
RtlVirtualUnwind
LeaveCriticalSection
GetProcAddress
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetComputerNameA
GetVersionExA
GetACP
GetOEMCP
FreeLibrary
Sleep
GetLastError
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCurrentDirectoryA
GetFileAttributesA
FindFirstFileA
FindNextFileA
WaitForSingleObject
CloseHandle
GetTickCount
DisconnectNamedPipe
MultiByteToWideChar
OpenProcess
TerminateProcess
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32First
Process32Next
ReadFile
GetLogicalDrives
CreateThread
VirtualProtect
PeekNamedPipe
OutputDebugStringA
ExitProcess
ExitThread
LocalFree
GetCurrentThreadId
FreeSid
GetUserNameA
CheckTokenMembership
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptGetHashParam
CryptSetHashParam
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
LookupAccountSidA
GetTokenInformation
RevertToSelf
ImpersonateLoggedOnUser
OpenProcessToken
AllocateAndInitializeSid
InternetOpenA
InternetConnectA
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionA
InternetSetOptionA
InternetSetStatusCallback
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetCloseHandle
htons
ntohs
ntohl
send
WSAIoctl
WSACleanup
WSAStartup
htonl
closesocket
ioctlsocket
recv
shutdown
WSAGetLastError
__WSAFDIsSet
accept
select
WSASocketA
launch_v0
launch_v10
launch_v100
launch_v11
launch_v12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ