Bqe
Eni
Mxa
Nkh
Nzb
Plj
Qpa
Sju
Vyb
Won
Static task
static1
Behavioral task
behavioral1
Sample
08ac859362fc9f1cbfafe4086825a1cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08ac859362fc9f1cbfafe4086825a1cc.exe
Resource
win10v2004-20231215-en
Target
08ac859362fc9f1cbfafe4086825a1cc
Size
360KB
MD5
08ac859362fc9f1cbfafe4086825a1cc
SHA1
01140705ee595482edd7615e7e8517fbb267b376
SHA256
485c6f2e95df6ecc0936f8d6fcb17b4f314ba09104563cde254ee51097949ab0
SHA512
153f56a4602dfe153dacf231b84bc4097176395e8d8952422502f53378a6ab3b2b481453f0cfdbd5f8c7ec29f01f5429ee6adaed9b176a4ce928c59f71fc7c2f
SSDEEP
6144:ASJMlDAx0ZMWSHaJEvblC3mBfFhnNH4oTXYEPEopTKNP:ASmTMAYvZmo73i
Checks for missing Authenticode signature.
resource |
---|
08ac859362fc9f1cbfafe4086825a1cc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
VariantClear
SysFreeString
SysAllocStringLen
LoadTypeLib
CloseServiceHandle
CreateServiceA
InitializeSecurityDescriptor
OpenProcessToken
AdjustTokenPrivileges
ReleaseStgMedium
ReadClassStg
OleSaveToStream
OleFlushClipboard
CreateOleAdviseHolder
CreateDataAdviseHolder
CoRegisterClassObject
CoGetClassObject
CLSIDFromString
SetMenuInfo
SetFocus
RegisterClassA
LoadIconA
DrawMenuBar
DrawCaption
CharToOemA
ActivateKeyboardLayout
SHGetMalloc
SHBindToParent
SHFileOperationA
SHGetFileInfoA
StrStrIA
PathIsDirectoryA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
PathCompactPathExA
PathCanonicalizeA
PathAppendA
PathUnquoteSpacesA
PathQuoteSpacesA
PathMatchSpecA
PathIsRootA
PathIsRelativeA
malloc
getenv
memset
realloc
strcmp
strlen
strstr
strtol
__dllonexit
free
fflush
_except_handler3
__set_app_type
memchr
ExitThread
GetCommandLineA
OpenFileMappingA
lstrcpynA
ExitProcess
Bqe
Eni
Mxa
Nkh
Nzb
Plj
Qpa
Sju
Vyb
Won
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ