DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.258fd3bcfc3639d71c2efcfb8d4101d0.dll
Resource
win10v2004-20231020-en
Target
NEAS.258fd3bcfc3639d71c2efcfb8d4101d0.exe
Size
197KB
MD5
258fd3bcfc3639d71c2efcfb8d4101d0
SHA1
d999a74d39a5af38a3e6018e2d2629f8efd8c2b7
SHA256
b188c72965d9217c32fc4c540ebaaf483f33a0e44b1f0ceb523b55a3515f213a
SHA512
8dd1df5d4b61cd54c178b24be2397a7df199480498ffa4902ed2e59ca8b3cf761348099ea4f88c4158314783eccaaad32444e4166a5f9607a4dafc6f1bdde82f
SSDEEP
3072:8V2QPKpMtYM61bg2ZRbSIiQ0PW/aYCmo27ihp72SICXBJvzcAPJ:XQP76ReGtihp7tv
Checks for missing Authenticode signature.
resource |
---|
NEAS.258fd3bcfc3639d71c2efcfb8d4101d0.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memcpy
_except_handler4_common
_initterm
malloc
_amsg_exit
_XcptFilter
vsprintf_s
_vscprintf
free
setlocale
_strdup
isalpha
atol
atof
isspace
isalnum
isdigit
sscanf_s
isxdigit
_purecall
memcmp
memset
LockResource
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapCreate
MoveFileA
ReadFile
SetFilePointer
WriteFile
GetTempFileNameA
DeleteFileA
WaitForMultipleObjects
CreateEventA
InitializeCriticalSection
EnterCriticalSection
SetEvent
WaitForSingleObject
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
lstrcmpiA
lstrcmpA
lstrlenA
FindResourceA
LoadResource
CreateThread
SizeofResource
FreeResource
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ