Rmu
Txwrsxvrzac
Ufrrnebj
Zf
Static task
static1
Behavioral task
behavioral1
Sample
084e3940066c81b621cf60dddf9b114d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
084e3940066c81b621cf60dddf9b114d.exe
Resource
win10v2004-20231215-en
Target
084e3940066c81b621cf60dddf9b114d
Size
48KB
MD5
084e3940066c81b621cf60dddf9b114d
SHA1
3ff162faa60c433c6734e1a3bd15cc974c7fa7f3
SHA256
e3396534ccbe0649b0d8130d64e3e68f06fc18fe1cd8f8acd444ff04403cfdc2
SHA512
245f9c3789f0e7d19c3efd7178c8d0934fc9862893ae124bdcccee1dd8d4a033530e0dbad2cc4fd3d6ea608e17508a7e961685c66a54b153c8ed1acff3c4737e
SSDEEP
768:GCwUR8S+ibLNRWn6shqeV0XZ2/PMLeQ69+x6+zEui:GPO8RiV+JV6rer+xHz
Checks for missing Authenticode signature.
resource |
---|
084e3940066c81b621cf60dddf9b114d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnterCriticalSection
EnumResourceTypesA
ExitProcess
FlushFileBuffers
GetACP
GetCommandLineA
GetDateFormatA
GetLocalTime
GetModuleHandleA
GetOEMCP
GetStartupInfoA
InitializeCriticalSection
RtlUnwind
SetEndOfFile
SetUnhandledExceptionFilter
lstrcatA
lstrlenA
GetDC
FillRect
EqualRect
EndDeferWindowPos
GetMessageA
DefDlgProcA
CreateMenu
CreateDialogIndirectParamA
ChangeMenuA
IsCharUpperA
LoadImageA
DestroyIcon
RegOpenKeyExA
RegEnumKeyA
LsaClose
LsaCreateSecret
LsaCreateTrustedDomain
LsaDelete
LsaDeleteTrustedDomain
LsaEnumerateAccounts
LsaEnumerateAccountsWithUserRight
LsaEnumeratePrivileges
LsaEnumeratePrivilegesOfAccount
LsaEnumerateTrustedDomainsEx
LsaFreeMemory
LsaGetSystemAccessAccount
LsaGetUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaFileSeek
__vbaDerefAry1
__vbaCyUI1
__vbaCyForInit
__vbaCyFix
__vbaCyAdd
__vbaCastObjVar
__vbaAryVarVarg
__vbaAryDestruct
DirectInputCreateEx
DirectInputCreateA
DirectInputCreateW
Rmu
Txwrsxvrzac
Ufrrnebj
Zf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ