ApplicationConnect
ApplicationEntry
ApplicationNotify
ApplicationRecv
ApplicationSend
Static task
static1
Behavioral task
behavioral1
Sample
04bc99351f458986634bf27f5dbe80b1.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04bc99351f458986634bf27f5dbe80b1.dll
Resource
win10v2004-20231215-en
Target
04bc99351f458986634bf27f5dbe80b1
Size
28KB
MD5
04bc99351f458986634bf27f5dbe80b1
SHA1
10328da01ed8d6d4e3963151e39d21c6d6309b07
SHA256
9578119966b2f0bcef8224e499a0a939ac0a1b9ea2285510c0eb8c3e19da51a5
SHA512
839048f82b08c08250b03c6fc924abefb485b084e1efdc33940f91e987126c5a0c5ce68896d7fafd437d0b92b3fc015da71468418f6b98ae7b197087966cfb69
SSDEEP
192:YsGLBKvXJUPpoBg+SpN6GxBcf+QgagR1HJsJxKVF0VEP2RFWPEXBEC3tPDym4yCk:YsGLMvi8XS76Gxt1p+MVHib33ACWS
Checks for missing Authenticode signature.
resource |
---|
04bc99351f458986634bf27f5dbe80b1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
GetLastError
WriteProcessMemory
VirtualProtectEx
MultiByteToWideChar
ReadProcessMemory
WaitForSingleObject
Sleep
CreateThread
CloseHandle
ReadFile
CreateFileA
GetSystemDirectoryA
WideCharToMultiByte
GetCurrentProcess
VirtualProtect
TerminateProcess
SetEvent
WriteFile
lstrcpyA
CreateEventA
OpenProcess
GetCurrentProcessId
CreateMutexA
HeapFree
GetProcessHeap
HeapAlloc
bind
htons
closesocket
listen
__WSAFDIsSet
select
accept
gethostbyname
inet_addr
inet_ntoa
ntohs
recv
connect
send
WSAGetLastError
socket
IsCharAlphaNumericA
wvsprintfA
wsprintfA
ApplicationConnect
ApplicationEntry
ApplicationNotify
ApplicationRecv
ApplicationSend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ