GetHandleVerifier
IsSandboxedProcess
Static task
static1
Behavioral task
behavioral1
Sample
346e3a859abd75dbd4b905ff39d2a42b.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
346e3a859abd75dbd4b905ff39d2a42b.exe
Resource
win10v2004-20231201-en
Target
346e3a859abd75dbd4b905ff39d2a42b
Size
7.3MB
MD5
346e3a859abd75dbd4b905ff39d2a42b
SHA1
da27d4a76388da80b4d3af052b884ac243d4d5ed
SHA256
b11e92eeabd6427b62f86e26f5ade881ca1a88be4686c2ea45523b5b3a7a217a
SHA512
efe50a10b45cce41222a9a3a0df48fcbdfe417f45ab9ddf00bf21fd5ce746853b3467cc051d7af3ae095ff52d87dde29ec44af23e9371f8356536982bc93a8bb
SSDEEP
98304:5xC3ud6MOIvysiwCQKzo5qphIHVruP3WpF3UdE1hZHEdLFAmil+:+GQFMkhgJuP32+dmhZk/W
Checks for missing Authenticode signature.
resource |
---|
346e3a859abd75dbd4b905ff39d2a42b |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
DuplicateHandle
GetFileType
SetHandleInformation
RegisterWaitForSingleObject
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
ReadProcessMemory
GetCurrentDirectoryW
GetModuleFileNameW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
LoadLibraryW
FreeLibrary
ReleaseSRWLockExclusive
VirtualFreeEx
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
UnmapViewOfFile
FindResourceW
SizeofResource
LoadResource
LockResource
CreateDirectoryW
ReadFile
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
VirtualAlloc
SetThreadPriority
SearchPathW
lstrlenW
DebugBreak
GetModuleHandleExW
SetFilePointerEx
GetFileSizeEx
SetEndOfFile
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SwitchToThread
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
CreateTimerQueue
FreeLibraryAndExitThread
ExitThread
GetExitCodeThread
AreFileApisANSI
GetWindowsDirectoryW
DeviceIoControl
GetEnvironmentVariableW
TryEnterCriticalSection
CreateEventA
GetThreadId
RaiseException
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
GetNativeSystemInfo
GetVersionExW
GetTickCount
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DeleteCriticalSection
WaitForSingleObject
PostQueuedCompletionStatus
SetEvent
TerminateJobObject
LeaveCriticalSection
EnterCriticalSection
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
InitializeCriticalSection
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetModuleHandleA
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
GetSystemInfo
VerifyVersionInfoW
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateMutexW
ReleaseMutex
HeapSetInformation
GetProcessHeap
GetLastError
CloseHandle
GetCommandLineW
GetThreadPriority
CancelIoEx
DisconnectNamedPipe
ConnectNamedPipe
CancelSynchronousIo
GetProcessTimes
VerSetConditionMask
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
OutputDebugStringW
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
VirtualProtect
LoadLibraryExA
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
FormatMessageW
LocalAlloc
TerminateThread
CreateFileMappingA
MapViewOfFileEx
OpenFileMappingA
ExitProcess
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetConsoleCP
GetConsoleMode
SetStdHandle
GetStdHandle
WriteConsoleW
GetDateFormatW
CloseDesktop
CloseWindowStation
GetSystemMetrics
GetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
SetProcessWindowStation
GetUserObjectInformationW
CreateDesktopW
GetUserNameW
EventWrite
EventUnregister
EventRegister
GetSidSubAuthorityCount
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
CommandLineToArgvW
SHGetKnownFolderPath
SHGetFolderPathW
CoTaskMemFree
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ