pggkai
pgguan
Static task
static1
Behavioral task
behavioral1
Sample
13cab4755952ae1a4e44923d1701ed93.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13cab4755952ae1a4e44923d1701ed93.dll
Resource
win10v2004-20231215-en
Target
13cab4755952ae1a4e44923d1701ed93
Size
27KB
MD5
13cab4755952ae1a4e44923d1701ed93
SHA1
c49c5f4814618bdeb3c1c736219530d6da76732c
SHA256
c2e53dd8ea050fb15921cafdfe7df4479797bf190b5d9f206d51669125cbbc52
SHA512
6c74d2e3653b01a87249013db873d1f295f50e63f2fc2e0d17f198c8d8c6118b04d7940832f7c3a6c0754d88782f8d21d5c319e7c0c1584606af4973aa2bb447
SSDEEP
384:hYeZBjMXIKJ1B7nz+4fd9Sp8WKOa0KjBX5wcNNcjc9ZfApo0E:meYIcnnz+SSJha0KjJqYcjc9ZfAk
Checks for missing Authenticode signature.
resource |
---|
13cab4755952ae1a4e44923d1701ed93 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
Sleep
lstrcpyA
lstrcmpA
ExitProcess
lstrcmpiA
lstrlenA
GetTickCount
lstrcpynA
GetSystemTime
GetCommandLineA
CloseHandle
ReadFile
CreateFileA
GetModuleHandleA
SetFilePointer
GetModuleFileNameA
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
HttpQueryInfoA
pggkai
pgguan
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE