_J@20
ox@4
_HGe
y@20
J@4
q0@20
Static task
static1
Behavioral task
behavioral1
Sample
2cf967c6357157786cbb56d098264080.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cf967c6357157786cbb56d098264080.exe
Resource
win10v2004-20231215-en
Target
2cf967c6357157786cbb56d098264080
Size
170KB
MD5
2cf967c6357157786cbb56d098264080
SHA1
edecfcd57b550f841b2652158e3b3320b64e13ff
SHA256
cfe0901fed67a67bc93751f5991fe18c12eb2244e8c43d869f58b64d60124d85
SHA512
4f12205ae226c1cf5d366f58b9207ccc1bd001afcefc5cd7110659984594123b63983db6b113ba100b7ef105e72559f3eb8cc04d854625b63a576b4e477352ed
SSDEEP
3072:rA+nYUVUGpUBsar1yzZkZJFLqAJHuF9g6oVMw1cgleyumAU:EjUmGhe1ylYbLqAw9ccaeyumA
Checks for missing Authenticode signature.
resource |
---|
2cf967c6357157786cbb56d098264080 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetMenu
GetSysColor
CreateMenu
RedrawWindow
GetActiveWindow
PostQuitMessage
IsZoomed
PeekMessageW
PtInRect
IsWindowEnabled
PathIsDirectoryA
PathFileExistsA
SHSetValueA
IsBadReadPtr
VirtualAlloc
GetProcessHeap
GlobalAlloc
GetProcAddress
ExitProcess
GetStartupInfoA
GetCurrentThreadId
LocalAlloc
_J@20
ox@4
_HGe
y@20
J@4
q0@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ