RoamingTraiI
?ImpactDS@@YG_JU_HALIGNLEFT@@U_REMOTECONTROL_SYS@@@I
?JoinLower@@YG_JU_HALIGNLEFT@@U_REMOTECONTROL_SYS@@@I
Static task
static1
Behavioral task
behavioral1
Sample
358e72f6e0e2d1f1afb0fc53a47219cf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
358e72f6e0e2d1f1afb0fc53a47219cf.exe
Resource
win10v2004-20231215-en
Target
358e72f6e0e2d1f1afb0fc53a47219cf
Size
49KB
MD5
358e72f6e0e2d1f1afb0fc53a47219cf
SHA1
0f33e16081e27dabc5f3584fa8dc585fe58a61ec
SHA256
47a3875381efa960b6edaf04948b135bc68a95dd1ad9fbf74150b6008d31c591
SHA512
bd0039b37c4aadea10d9de876debd94e7daea7504aa6805da7418088d479ad921b752c8e3bfa1e78e85973df8ab7d321853b6ce7038551a04bc02374a67dcc4a
SSDEEP
1536:5XPx6Iba1EqrJpXvhEIuxTnTOen1m333P+IBz4A8:5XPXbopXOIuNnCenKt4
Checks for missing Authenticode signature.
resource |
---|
358e72f6e0e2d1f1afb0fc53a47219cf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetForegroundWindow
StrPBrkA
IsValidCodePage
RoamingTraiI
?ImpactDS@@YG_JU_HALIGNLEFT@@U_REMOTECONTROL_SYS@@@I
?JoinLower@@YG_JU_HALIGNLEFT@@U_REMOTECONTROL_SYS@@@I
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ