@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
eea4c143a7562eacb144d8f2250f97d2974b7717b996e00ae2465bffeab8281d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
eea4c143a7562eacb144d8f2250f97d2974b7717b996e00ae2465bffeab8281d.exe
Resource
win10v2004-20231023-en
Target
eea4c143a7562eacb144d8f2250f97d2974b7717b996e00ae2465bffeab8281d
Size
519KB
MD5
7a3621b00b3a4af05fb83ef16fcd64b5
SHA1
d6c46ecce7f7b42df34a2fe3581e9aaa10b24efe
SHA256
eea4c143a7562eacb144d8f2250f97d2974b7717b996e00ae2465bffeab8281d
SHA512
38fec89435b244af87baa9a90caf8fcefb174f798da1016ecc29bd95c302f9f9bd6fb5b2525c711cb387ab14515e4b41e2d4fac8678e2e872596cfc29bf8a460
SSDEEP
6144:SQAs+fOdFacTDR17kUqPpnFmzyuINKCZ76LS2aRMMMpm/tYkkN4:bRDHkUqPpFmWCCQxRMb/s
Checks for missing Authenticode signature.
resource |
---|
eea4c143a7562eacb144d8f2250f97d2974b7717b996e00ae2465bffeab8281d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
CloseHandle
CreateFileA
CreateFileW
CreateSemaphoreA
CreateToolhelp32Snapshot
ExitProcess
FindResourceA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetTimeZoneInformation
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
HeapAlloc
HeapFree
IsBadReadPtr
LCMapStringA
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
OpenProcess
Process32First
Process32Next
RaiseException
ReadFile
ReleaseSemaphore
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WriteFile
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
EnumThreadWindows
MessageBoxA
wsprintfA
@@Unit1@Finalize
@@Unit1@Initialize
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ