_MainWndProc@16
_StubFileWrite@12
Static task
static1
Behavioral task
behavioral1
Sample
116decbc891dc1440534a4e5f411f424.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
116decbc891dc1440534a4e5f411f424.exe
Resource
win10v2004-20231215-en
Target
116decbc891dc1440534a4e5f411f424
Size
123KB
MD5
116decbc891dc1440534a4e5f411f424
SHA1
dd48cc95f107d2c791d1e1b8d23b8ca1f924f9df
SHA256
e14af40b87548a53860b94494ea641109b2ff3aeb4b314721782ed95c93c226a
SHA512
e097ce6c0ab4fa9d7f8b57c2299b6c888d2a7a68c37ad6e0a3953dfc7d4036ee1185cd6712c92118a9b30c5ccc3a470d2a375130365be0a53b619ae5ef4765b4
SSDEEP
3072:zCycjM8CEDUTZXVYBRC6weLrqde2qU9c6JZhK:/8GEDUcBRT1LruN9Z0
Checks for missing Authenticode signature.
resource |
---|
116decbc891dc1440534a4e5f411f424 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetVersionExA
OpenFile
FreeLibrary
GetProcAddress
LoadLibraryA
_lcreat
WinExec
_lopen
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
SetErrorMode
ExitProcess
_lwrite
GetLastError
lstrcatA
GlobalLock
FormatMessageA
LocalFree
lstrcpyA
GetTempPathA
GetWindowsDirectoryA
GetTempFileNameA
MulDiv
lstrlenA
_lread
_llseek
GlobalUnlock
GlobalFree
GlobalAlloc
_lclose
ExitWindowsEx
wsprintfA
CreateWindowExA
ShowWindow
SetWindowPos
UpdateWindow
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
MessageBoxA
BeginPaint
DrawTextA
EndPaint
InvalidateRect
PostQuitMessage
DefWindowProcA
GetDC
ReleaseDC
GetClientRect
SendMessageA
SetTextColor
SetBkMode
SelectObject
StretchDIBits
CreateFontA
TextOutA
RealizePalette
SelectPalette
CreatePalette
GetStockObject
DeleteObject
CreateSolidBrush
GetDeviceCaps
PatBlt
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ