DoMainWork
DoService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
7474a569eb3eec5e65a6f722834b9a02.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7474a569eb3eec5e65a6f722834b9a02.dll
Resource
win10v2004-20231215-en
Target
7474a569eb3eec5e65a6f722834b9a02
Size
134KB
MD5
7474a569eb3eec5e65a6f722834b9a02
SHA1
ede9659bf35066e299706dc875240916b633812c
SHA256
e441c6eaaf3a49be7b69d1953062b17cacf8fb8b17282ace74c7a978adea4f94
SHA512
c1b6ff5d7dd266f085aae029cf0fb2c50c5dfcdd2ef8c49c915d00c63566c7159e85525a1c184fd4e4101d89e70d7523e0c4499185815c0dfb6b277a63827756
SSDEEP
3072:awqfndUvoU7EDDrTMOY3loWZgL3KcO7FILQCO6SjhC2lEgC53Ui23:awAUQU7EHrU3lop3KcQIS6oCyC5kr
Checks for missing Authenticode signature.
resource |
---|
7474a569eb3eec5e65a6f722834b9a02 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitWindowsEx
DeleteObject
RegCloseKey
ShellExecuteA
CreateStreamOnHGlobal
listen
StrCmpW
GetModuleFileNameExA
ImmReleaseContext
capCreateCaptureWindowA
waveInUnprepareHeader
malloc
lstrcatW
GetModuleHandleA
GetProcAddress
VirtualProtect
DoMainWork
DoService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ