fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
0277dd0e9ff8bc8f047f71f505145b58.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0277dd0e9ff8bc8f047f71f505145b58.dll
Resource
win10v2004-20231215-en
Target
0277dd0e9ff8bc8f047f71f505145b58
Size
10KB
MD5
0277dd0e9ff8bc8f047f71f505145b58
SHA1
06cc39a535a1d28a743d15472d6cdd696c25427f
SHA256
cffcbb701d8d0b4fae38f6be035684724fbccdf0fc2ac6a37b5db60d4a696f5f
SHA512
286bd57d30f1ea28095037f7abad1205eaf4efc11b0a3856899b2186a260e01e9f2a1cfce28dd4083e8c000486eed5d1c6e5b88b6ff7529a9767ded982fd5080
SSDEEP
96:HWzI5vVYN6xFsN2F28ePLWddrvzGYpGiLFVzAu8ZMnhfE0pHK8T03tiG9yafZuhB:2QvO6xFs0FFGWGEzAZspHK3njKB
Checks for missing Authenticode signature.
resource |
---|
0277dd0e9ff8bc8f047f71f505145b58 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
Sleep
GetCommandLineA
GlobalFree
GetModuleHandleA
GetCurrentProcess
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
VirtualProtectEx
CreateThread
ReadProcessMemory
SetWindowsHookExA
GetKeyboardState
ToUnicode
CallNextHookEx
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
strcmp
_adjust_fdiv
malloc
_initterm
free
memset
strstr
memcpy
strrchr
strcpy
strlen
_stricmp
strcat
sprintf
??2@YAPAXI@Z
strncpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ