faioufoalkdfOn
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
665a0000e9dd717959bd815a92b59303.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
665a0000e9dd717959bd815a92b59303.dll
Resource
win10v2004-20231215-en
Target
665a0000e9dd717959bd815a92b59303
Size
18KB
MD5
665a0000e9dd717959bd815a92b59303
SHA1
8a9ded693687dcf4f7259551c11fb1efd2d18bac
SHA256
51b15b05b396e7f917e3087f5d2fd0135aca77e599a8ed7144a73e1be6642dc4
SHA512
b78c9fb24566765aa3d9e149458baf57b52d9339e8eeade8cf5726070e043d51def674e33f09b988a8d52b05d13bf5bc3f31fb276bb4006ef3c34a4bd5255eaa
SSDEEP
384:wJQto34xMwpy8IQzXlXyNw1CrHeA39z6EJe2vs:witiSL7LgNw1Cr+a9zHJe2vs
Checks for missing Authenticode signature.
resource |
---|
665a0000e9dd717959bd815a92b59303 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetLastError
GetCurrentProcess
GetModuleHandleA
WriteFile
MultiByteToWideChar
lstrcatA
GetTickCount
FindClose
FindFirstFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetModuleFileNameA
VirtualAllocEx
lstrlenA
GetTempPathA
GetWindowsDirectoryA
ReleaseMutex
CreateMutexA
FreeLibrary
GetSystemDirectoryA
GetFileAttributesA
FindNextFileA
MoveFileExA
Sleep
DeleteFileA
CopyFileA
GlobalAlloc
GlobalFree
SetEndOfFile
lstrcpyA
CreateThread
GetCurrentProcessId
CreateFileA
ReadFile
SetFilePointer
CloseHandle
GetFileSize
LoadLibraryA
WriteProcessMemory
GetProcAddress
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
FindWindowA
GetMessageA
EnumWindows
wsprintfA
GetWindowThreadProcessId
SetWindowsHookExA
PostMessageA
LookupPrivilegeValueA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegEnumValueA
AdjustTokenPrivileges
??2@YAPAXI@Z
rand
srand
_stricmp
memset
strlen
strcat
strrchr
strcpy
_except_handler3
strstr
_strlwr
memcpy
sprintf
??3@YAXPAX@Z
GetModuleFileNameExA
EnumProcessModules
faioufoalkdfOn
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ