DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.08338a711d51a486a1e9f4d14dc6c0b0.dll
Resource
win10v2004-20231023-en
Target
NEAS.08338a711d51a486a1e9f4d14dc6c0b0.exe
Size
197KB
MD5
08338a711d51a486a1e9f4d14dc6c0b0
SHA1
e5d6d48f8a3a0091f97d386f141b0ecdeb5ebef9
SHA256
decccbde2d5cad3718aad74f9c4d4b575f41a521b0372ed083319a679faf0f06
SHA512
fe6f0e27d4be4d20c99615c70fb099afe13c93183ebb8dc6677388ccc3aaf40c884f60f54d0e89c446dacb980c7e025e887bd233fefdcdbd02abc0fab40547f3
SSDEEP
3072:CV2QOKFM76q61bq9RbSYZcMlgosYCmoYwihphF1I2XBJVFcOC/lAZ:NQOZ6AdjmihphFVuCZ
Checks for missing Authenticode signature.
resource |
---|
NEAS.08338a711d51a486a1e9f4d14dc6c0b0.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memcpy
_except_handler4_common
_initterm
malloc
_amsg_exit
_XcptFilter
vsprintf_s
_vscprintf
free
setlocale
_strdup
isalpha
atol
atof
isspace
isalnum
isdigit
sscanf_s
isxdigit
_purecall
memcmp
memset
LockResource
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapCreate
MoveFileA
ReadFile
SetFilePointer
WriteFile
GetTempFileNameA
DeleteFileA
WaitForMultipleObjects
CreateEventA
InitializeCriticalSection
EnterCriticalSection
SetEvent
WaitForSingleObject
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
lstrcmpiA
lstrcmpA
lstrlenA
FindResourceA
LoadResource
CreateThread
SizeofResource
FreeResource
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ