__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
02083b5bb25e3c89d5e35d7f25fb97888153e0c2e7a697aa6eee3817da7b89bb.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
02083b5bb25e3c89d5e35d7f25fb97888153e0c2e7a697aa6eee3817da7b89bb.exe
Resource
win10v2004-20231020-en
Target
02083b5bb25e3c89d5e35d7f25fb97888153e0c2e7a697aa6eee3817da7b89bb
Size
20.7MB
MD5
b683d3576368701b9909c0aa2d5f8551
SHA1
1118b798b1a950dd98d03263b466337070fc9297
SHA256
02083b5bb25e3c89d5e35d7f25fb97888153e0c2e7a697aa6eee3817da7b89bb
SHA512
fbf71a4758e9e2596cc74791aad4c2f13536144136691ddb13fef17faea8433231961e03893e34775d934b1b95619f5b47ffb840795a72bd09e4ac1d26a38426
SSDEEP
393216:SkHKN7u6KbbnGtRKjHLJMJGN0MdNkcQ04yNsH2d1P/mi5cymDrn/Ztiqx2WCCCXV:SkHjQD2LJIwNkcQ04yNsH2d1P/mi5cyf
Checks for missing Authenticode signature.
resource |
---|
02083b5bb25e3c89d5e35d7f25fb97888153e0c2e7a697aa6eee3817da7b89bb |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WNetGetConnectionW
SHGetMalloc
IsUserAnAdmin
ShellExecuteExW
CreateWindowExW
GetMessageW
CharToOemBuffA
TranslateMessage
CharLowerBuffA
CharLowerBuffW
PeekMessageA
PeekMessageW
GetSystemMetrics
PostMessageW
MessageBoxA
MessageBoxW
CharUpperBuffA
CharUpperBuffW
PostQuitMessage
MsgWaitForMultipleObjects
IsWindowUnicode
DispatchMessageW
DispatchMessageA
UnregisterClassW
IsWindow
GetClassInfoW
FindWindowExW
CharUpperW
DefWindowProcW
OemToCharBuffA
GetWindowLongPtrW
PostThreadMessageW
SetWindowLongPtrW
DestroyWindow
RegisterClassW
CharNextW
GetWindowThreadProcessId
LoadStringW
MsgWaitForMultipleObjectsEx
GetFileVersionInfoSizeW
VerQueryValueW
VerQueryValueA
GetFileVersionInfoW
GetErrorInfo
SysFreeString
VariantClear
VariantInit
SysReAllocStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
VariantCopyInd
NormalizeString
GetAce
CreateServiceW
DeleteAce
RegUnLoadKeyW
CryptReleaseContext
RegSaveKeyW
EqualSid
DeleteService
GetLengthSid
RegReplaceKeyW
LookupAccountSidW
RegCreateKeyExW
CryptAcquireContextW
SetSecurityDescriptorDacl
SetEntriesInAclW
RegEnumKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenSCManagerW
RegOpenKeyExW
AllocateAndInitializeSid
RegDeleteValueW
RegFlushKey
RegEnumValueW
RegQueryValueExW
InitializeSecurityDescriptor
RegRestoreKeyW
CloseServiceHandle
RegSetValueExW
RegConnectRegistryW
StartServiceCtrlDispatcherW
GetUserNameW
DeregisterEventSource
RegQueryInfoKeyW
CryptGenRandom
SetServiceStatus
IsValidSid
RegisterEventSourceW
RegisterServiceCtrlHandlerW
OpenServiceW
RegLoadKeyW
GetSecurityDescriptorLength
GetSecurityDescriptorControl
RegDeleteKeyW
OpenProcessToken
GetAclInformation
FreeSid
ReportEventW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
ConvertSidToStringSidW
RegCloseKey
NetApiBufferFree
NetShareEnum
memcpy
memset
SetFileAttributesW
GetFileTime
GetFileType
SetFileTime
RtlUnwindEx
QueryDosDeviceW
GetACP
GetExitCodeProcess
GetStringTypeExW
CloseHandle
LocalFree
GetCurrentProcessId
SizeofResource
VirtualProtect
CreateSemaphoreW
WritePrivateProfileStringA
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FindNextFileW
FlushInstructionCache
GetFullPathNameW
VirtualFree
GetProcessHeap
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
GetSystemTime
GetLongPathNameW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
CreateWaitableTimerW
GetStdHandle
GetTimeZoneInformation
DisconnectNamedPipe
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
FileTimeToDosDateTime
ReadFile
DosDateTimeToFileTime
GetUserDefaultLCID
CreateProcessW
GetLastError
GetModuleFileNameW
SetLastError
GetNativeSystemInfo
GlobalAlloc
GlobalUnlock
FindResourceW
CreateThread
CompareStringW
CopyFileW
MapViewOfFile
CreateMutexW
LoadLibraryA
GetVolumeInformationW
ResetEvent
FreeResource
GetComputerNameExW
GetDriveTypeW
GetVersion
MoveFileW
RaiseException
GetSystemTimeAsFileTime
FormatMessageW
OpenProcess
SwitchToThread
GetExitCodeThread
OutputDebugStringW
ReadDirectoryChangesW
GetCurrentThread
LocalFileTimeToFileTime
GetFileAttributesExW
IsBadReadPtr
ExpandEnvironmentStringsW
LockResource
LoadLibraryExW
CancelIo
FileTimeToSystemTime
GetCurrentThreadId
UnhandledExceptionFilter
PeekNamedPipe
VirtualQuery
GetPrivateProfileStringA
GlobalFree
VirtualQueryEx
Sleep
SetVolumeLabelW
EnterCriticalSection
GetDiskFreeSpaceExW
SetFilePointer
FlushFileBuffers
GetStringTypeExA
LoadResource
SuspendThread
GetTickCount
WaitForMultipleObjects
GetTempFileNameW
GetFileSize
GetStartupInfoW
GetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
GlobalLock
SetThreadPriority
VirtualAlloc
GetTempPathW
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
SearchPathW
SetWaitableTimer
GetLogicalDriveStringsW
GetVersionExW
VerifyVersionInfoW
HeapCreate
DeviceIoControl
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
UnmapViewOfFile
GetConsoleCP
GetModuleFileNameA
lstrlenW
CompareStringA
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryW
SetEvent
ReleaseSemaphore
GetLocaleInfoW
CreateFileW
DeleteFileW
SetThreadAffinityMask
IsDBCSLeadByteEx
FindCloseChangeNotification
ConnectNamedPipe
GetEnvironmentVariableW
GetLocalTime
WaitForSingleObject
WriteFile
FindFirstFileExW
CreateFileMappingW
CreateNamedPipeW
ExitThread
OpenThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
CreateDirectoryW
GetOverlappedResult
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
GlobalMemoryStatus
SetConsoleCtrlHandler
CreateEventW
WaitForMultipleObjectsEx
GetThreadLocale
SetThreadLocale
CoInitializeEx
CreateBindCtx
MkParseDisplayName
CoInitialize
CoInitializeSecurity
CoUninitialize
GetUserNameExW
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ