Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
2ae31e68a00215072a3630089854baf9.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ae31e68a00215072a3630089854baf9.dll
Resource
win10v2004-20231215-en
Target
2ae31e68a00215072a3630089854baf9
Size
110KB
MD5
2ae31e68a00215072a3630089854baf9
SHA1
5d3459b894297f40ef8280109455063ccb36fe71
SHA256
c644b32e66235baee2554fec2a319a7edc0146c8718d28d6428f7dee22391a8b
SHA512
9f912f4e0db240f1b8489d4fe057420bc752e94bece0e4ec7023ee84d042710a0468d94a9ab1a7aab7ed4ae283f637c2e7a3679d3f13618678f9385302ab0b2f
SSDEEP
1536:X6+f9cJ0GBrXF8VoIynSDRN2sR8wjtF8YTwF4+tSn1Aecx4AGC6hnqosdfmGVFPC:5TodSDRUsR8qTwM1AecWc6Jqosdfm4a
Checks for missing Authenticode signature.
resource |
---|
2ae31e68a00215072a3630089854baf9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ