Cjvbpirdgp
Xnfmpdmtsth
Static task
static1
Behavioral task
behavioral1
Sample
14e79d01729c2dde04bf0e5638ec9bd1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14e79d01729c2dde04bf0e5638ec9bd1.exe
Resource
win10v2004-20231215-en
Target
14e79d01729c2dde04bf0e5638ec9bd1
Size
100KB
MD5
14e79d01729c2dde04bf0e5638ec9bd1
SHA1
167106792c56d9a397396beb8299ba2cfec3cae7
SHA256
93aef35aa11b651f5636f9455199a8a2ea04a7e938169567afa1dbbf79616b45
SHA512
f425bbd05420971da387a1fecdb4a5edc50e561828771a30b59d2a012fb5abbc6bc5dbbc565f9350cf2282a5ff72def039f6bcab12f5611b0b66dc363d90215e
SSDEEP
1536:rvxSM9YWyR3B21ysbOiLrH72BHX/Vo4eOsJBVGiDUKsWjkf/X/m/T/:rv5DuxlsbLbEi4a7DC6e2
Checks for missing Authenticode signature.
resource |
---|
14e79d01729c2dde04bf0e5638ec9bd1 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GlobalUnlock
GlobalFree
BindIoCompletionCallback
GetFullPathNameA
RtlMoveMemory
SetConsoleTextAttribute
SetConsoleCursorMode
QueryPerformanceCounter
ReleaseSemaphore
EnterCriticalSection
SetProcessShutdownParameters
GetSystemDefaultUILanguage
GetCommandLineA
GetStartupInfoA
ExitProcess
strspn
NtDeleteKey
ZwReadVirtualMemory
ZwOpenDirectoryObject
ZwMakeTemporaryObject
NtSetHighEventPair
NtDuplicateObject
RtlDeleteTimer
RtlQueryProcessDebugInformation
wcscpy
RtlAddAttributeActionToRXact
NtQueryDirectoryFile
NtSetInformationKey
islower
Cjvbpirdgp
Xnfmpdmtsth
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ