_MainWndProc@16
_StubFileWrite@12
Static task
static1
Behavioral task
behavioral1
Sample
2cf0efedea84bfa89a0c3d73b443a3bd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cf0efedea84bfa89a0c3d73b443a3bd.exe
Resource
win10v2004-20231215-en
Target
2cf0efedea84bfa89a0c3d73b443a3bd
Size
2.0MB
MD5
2cf0efedea84bfa89a0c3d73b443a3bd
SHA1
075799fc85e57d41b9e938fae8a3dd139af2db3e
SHA256
e50364f13ebfade064cfb87bef76f2676d8e19ca028ddcb07717f1e4a7d884ec
SHA512
bc4457e45bd221249d65e862ba68334745e4194c3188251237db2128ab03d5e187816dec23a98924f68b0c613541ef72a54193c23a589ef483e95d240fcf70cd
SSDEEP
49152:5PsGriaIPsMkjXH+mJeeV1nY8IPrqZsxt+C5RYgYx+xw:f1IFkzHNBxIPrqZsZR7YB
Checks for missing Authenticode signature.
resource |
---|
2cf0efedea84bfa89a0c3d73b443a3bd |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetVersionExA
OpenFile
FreeLibrary
GetProcAddress
LoadLibraryA
_lcreat
WinExec
_lopen
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
SetErrorMode
ExitProcess
_lwrite
GetLastError
lstrcatA
GlobalLock
FormatMessageA
LocalFree
lstrcpyA
GetTempPathA
GetWindowsDirectoryA
GetTempFileNameA
MulDiv
lstrlenA
_lread
_llseek
GlobalUnlock
GlobalFree
GlobalAlloc
_lclose
ExitWindowsEx
wsprintfA
CreateWindowExA
ShowWindow
SetWindowPos
UpdateWindow
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
MessageBoxA
BeginPaint
DrawTextA
EndPaint
InvalidateRect
PostQuitMessage
DefWindowProcA
GetDC
ReleaseDC
GetClientRect
SendMessageA
SetTextColor
SetBkMode
SelectObject
StretchDIBits
CreateFontA
TextOutA
RealizePalette
SelectPalette
CreatePalette
GetStockObject
DeleteObject
CreateSolidBrush
GetDeviceCaps
PatBlt
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ