?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
ff9fe731f055fdee143c99698c9fa4c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ff9fe731f055fdee143c99698c9fa4c4.exe
Resource
win10v2004-20231215-en
Target
ff9fe731f055fdee143c99698c9fa4c4
Size
448KB
MD5
ff9fe731f055fdee143c99698c9fa4c4
SHA1
b5ede41a9a0e473199e7d9452c74ee5de849a88a
SHA256
0064f6a2607060ace2da9fc86711cabc34c05ce031c7f27ba61d3efb9ce8fe64
SHA512
0e728adcc5920b9171a59599b95034a285a4cf58782cfecc4c5769fbe70500f12457c967b638847d59d2da3600d0d1d354d1dbfffcc67ef2fd7409256636cfde
SSDEEP
12288:94x37/0pGufmL5MZZWyan1sVsz/YM5m+J6t5tz:ux374LmLOLWtn1r5hEtD
Checks for missing Authenticode signature.
resource |
---|
ff9fe731f055fdee143c99698c9fa4c4 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
VirtualFreeEx
GetLocalTime
CloseHandle
CreateFileA
WriteFile
SetEvent
Sleep
GetProcAddress
GetLastError
VirtualAllocEx
ResetEvent
SetStdHandle
LCMapStringW
LCMapStringA
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
RtlUnwind
FlushFileBuffers
ShowWindow
LoadStringA
LoadIconA
SetActiveWindow
joyGetPosEx
waveInClose
mixerClose
joyGetDevCapsA
joySetThreshold
?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ