@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
04a1030d1b4d8e635d0e4f8344e1e6ce.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04a1030d1b4d8e635d0e4f8344e1e6ce.exe
Resource
win10v2004-20231222-en
Target
04a1030d1b4d8e635d0e4f8344e1e6ce
Size
99KB
MD5
04a1030d1b4d8e635d0e4f8344e1e6ce
SHA1
267ecefdb932cb3a3b2331a749a68eb32d59980c
SHA256
f017fc59879b73a4e893306db3c39172e8240c5d63c0bc3c56c0cf5cf560cda3
SHA512
7fbf2be431472e9f7ca227510a38c6384951c20a2a2253c2853bd26c0866cfe5820b5b3f5439ed0caad90e0707a5703a1c532a408b12e57efb0f235834f7399f
SSDEEP
1536:EhhoC36chT5RNkJlC3NBVDXhnU6s6R3jxam0j4S+ABCKW+CC4VGsGTZNa3k79:IhoClhjN11XFU6j3ejVB8+14UZgk7
Checks for missing Authenticode signature.
resource |
---|
04a1030d1b4d8e635d0e4f8344e1e6ce |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
BeginUpdateResourceA
CloseHandle
CompareStringA
CopyFileA
CreateFileA
DeleteFileA
DeleteFileW
EndUpdateResourceA
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
MoveFileA
MultiByteToWideChar
OpenProcess
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFileAttributesA
SetFilePointer
SetHandleCount
SetLastError
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UpdateResourceA
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WriteFile
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
gethostname
htons
inet_addr
recv
select
send
socket
GetFileTitleA
ExtractIconA
CallNextHookEx
DispatchMessageA
EnumThreadWindows
ExitWindowsEx
GetActiveWindow
GetKeyboardState
GetMessageA
GetParent
GetWindowTextA
MessageBoxA
SetWindowsHookExA
ToAscii
TranslateMessage
UnhookWindowsHookEx
wsprintfA
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoUninitialize
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ