GetHandleVerifier
IsSandboxedProcess
Static task
static1
Behavioral task
behavioral1
Sample
2639cc06fcdbf95736f0e269e68d24c2.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
2639cc06fcdbf95736f0e269e68d24c2.exe
Resource
win10v2004-20231201-en
Target
2639cc06fcdbf95736f0e269e68d24c2
Size
7.3MB
MD5
2639cc06fcdbf95736f0e269e68d24c2
SHA1
91a83b00e02193bdaf9503d1f9e09ab68d584ea6
SHA256
81673fa2621c869ca035909110f3c5143255243e1e085f74ea5fda6f880373e6
SHA512
ecddb267271fc3f098c6480ade3c4ce72f5171163a89bd9ebca396df14a63e39e88026fa20b21cf8953e0791b431797db0fa2f13a40a3a87c263ff14b7894a42
SSDEEP
98304:TxC3ud6MOIvysi7CQKzo5qphIHVruP3WpF3UdE1hZHEdLF00i:4GQgMkhgJuP32+dmhZk/0Z
Checks for missing Authenticode signature.
resource |
---|
2639cc06fcdbf95736f0e269e68d24c2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
DuplicateHandle
GetFileType
SetHandleInformation
RegisterWaitForSingleObject
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
ReadProcessMemory
GetCurrentDirectoryW
GetModuleFileNameW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
LoadLibraryW
FreeLibrary
ReleaseSRWLockExclusive
VirtualFreeEx
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
UnmapViewOfFile
FindResourceW
SizeofResource
LoadResource
LockResource
CreateDirectoryW
ReadFile
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
VirtualAlloc
SetThreadPriority
SearchPathW
lstrlenW
DebugBreak
GetModuleHandleExW
SetFilePointerEx
GetFileSizeEx
SetEndOfFile
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SwitchToThread
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
CreateTimerQueue
FreeLibraryAndExitThread
ExitThread
GetExitCodeThread
AreFileApisANSI
GetWindowsDirectoryW
DeviceIoControl
GetEnvironmentVariableW
TryEnterCriticalSection
CreateEventA
GetThreadId
RaiseException
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
GetNativeSystemInfo
GetVersionExW
GetTickCount
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DeleteCriticalSection
WaitForSingleObject
PostQueuedCompletionStatus
SetEvent
TerminateJobObject
LeaveCriticalSection
EnterCriticalSection
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
InitializeCriticalSection
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetModuleHandleA
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
GetSystemInfo
VerifyVersionInfoW
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateMutexW
ReleaseMutex
HeapSetInformation
GetProcessHeap
GetLastError
CloseHandle
GetCommandLineW
GetThreadPriority
CancelIoEx
DisconnectNamedPipe
ConnectNamedPipe
CancelSynchronousIo
GetProcessTimes
VerSetConditionMask
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
OutputDebugStringW
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
VirtualProtect
LoadLibraryExA
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
FormatMessageW
LocalAlloc
TerminateThread
CreateFileMappingA
MapViewOfFileEx
OpenFileMappingA
ExitProcess
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetConsoleCP
GetConsoleMode
SetStdHandle
GetStdHandle
WriteConsoleW
GetDateFormatW
CloseDesktop
CloseWindowStation
GetSystemMetrics
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
SetProcessWindowStation
GetUserObjectInformationW
CreateDesktopW
GetUserNameW
EventWrite
EventUnregister
EventRegister
GetSidSubAuthorityCount
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
CoTaskMemFree
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ