HVJZUWRHgkp
UtNUVQNpVrV
fOkhlz
fdHyixUQJhJw
wVXguPf
Static task
static1
Behavioral task
behavioral1
Sample
7bf2c9ddf6cebb13675a577fbc7448fb.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bf2c9ddf6cebb13675a577fbc7448fb.dll
Resource
win10v2004-20231215-en
Target
7bf2c9ddf6cebb13675a577fbc7448fb
Size
62KB
MD5
7bf2c9ddf6cebb13675a577fbc7448fb
SHA1
4a4faf5a4a1b2cdbf32b86f87b8817dce5fd8010
SHA256
4d073cbc5eaa7a98d08c459534264cf7f1123f5152c2e451543b592191f9ea73
SHA512
f3e98de663eae7bb88e3f63acc1282d5e789a30fcd6c956ed676f4f234cc8a58d1ded68f0b806fdbd14d9342edb9294cf5f5030b920fe1e1c8bb2b92c4bb37c2
SSDEEP
1536:IXQiPbbGRUpuR92dcEcc0YFFFXmZLoYIhxClUfupRE+a4Lf:oQiPXGRN2eCMlWuO4D
Checks for missing Authenticode signature.
resource |
---|
7bf2c9ddf6cebb13675a577fbc7448fb |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
CreateEventA
GetVersionExA
lstrcmpA
VirtualAlloc
VirtualFree
lstrcmpiA
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetSystemTime
MoveFileA
GetCurrentThreadId
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
GetTempPathA
CreateMutexA
GetTickCount
GetLocaleInfoA
GetVolumeInformationA
SetEvent
GetFileSize
SystemTimeToFileTime
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetTempFileNameA
DeleteFileA
GlobalAlloc
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
RtlUnwind
VirtualQuery
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
OpenProcess
lstrlenA
GetLastError
GetModuleHandleA
GetProcAddress
FindAtomA
lstrcpyA
RaiseException
lstrcatA
ReleaseMutex
GetModuleFileNameA
TranslateMessage
GetMessageA
LoadCursorA
LoadIconA
DefWindowProcA
GetWindowTextA
CloseDesktop
SetThreadDesktop
GetThreadDesktop
OpenInputDesktop
MessageBoxA
DispatchMessageA
FindWindowExA
GetWindowThreadProcessId
GetFocus
RegisterClassExA
wsprintfA
IsWindowVisible
GetCursorPos
EqualRect
InflateRect
CreateWindowExA
ClientToScreen
CallNextHookEx
FindWindowA
SetWindowsHookExA
PostMessageA
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
OpenProcessToken
CreateProcessAsUserA
RegCreateKeyExA
SHDeleteValueA
SHGetValueA
SHSetValueA
SHDeleteKeyA
HVJZUWRHgkp
UtNUVQNpVrV
fOkhlz
fdHyixUQJhJw
wVXguPf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ