Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
2cea5c4aba08d58ef4d12702707c9b23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cea5c4aba08d58ef4d12702707c9b23.exe
Resource
win10v2004-20231215-en
Target
2cea5c4aba08d58ef4d12702707c9b23
Size
116KB
MD5
2cea5c4aba08d58ef4d12702707c9b23
SHA1
6f90c94b2ceee5b97304e43a616c9f9eccd86bb9
SHA256
e49135c84aadc0e5af15fd31e2daf5f302b24822f4ae1fa45bf3c27a60351445
SHA512
f55c0b84f188ad7f7d8b012ec9239dc3e9862aba88d39e684a3737d2eb983e8f895cb5c7a963b46d5628d1a39d3b27e5ae12c656396259d053996f0777152a96
SSDEEP
3072:zjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:C5ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
2cea5c4aba08d58ef4d12702707c9b23 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ