Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
f6676c6564cdf74964fe5dbbc7df7d60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6676c6564cdf74964fe5dbbc7df7d60.exe
Resource
win10v2004-20231215-en
Target
f6676c6564cdf74964fe5dbbc7df7d60
Size
116KB
MD5
f6676c6564cdf74964fe5dbbc7df7d60
SHA1
82ab0a5b4d01904000b7f13cb1de7bc269c1abe9
SHA256
4e3ced15e18883a1b097e5cb5190cd1ab202475be6bc649d14dfe8bea18c0acb
SHA512
64faf6b2659f4f7e3e34072da2cb028f4883cff82a086b6f06ca98a510388bd04ed106f9ad02248765234dd19e4fc7e926c1f52c69e19f5ea1430b3e3b5fa4eb
SSDEEP
3072:yjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:55ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
f6676c6564cdf74964fe5dbbc7df7d60 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ