MjxInst
MjxRun
MjxShutdown
MjxStartup
MjxTest
Static task
static1
Behavioral task
behavioral1
Sample
05fda0f3f3ed35ed17f6ccefca40f57b.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05fda0f3f3ed35ed17f6ccefca40f57b.dll
Resource
win10v2004-20231215-en
Target
05fda0f3f3ed35ed17f6ccefca40f57b
Size
33KB
MD5
05fda0f3f3ed35ed17f6ccefca40f57b
SHA1
eeb9954fc06ecde28c5c99a2cc21ebe93d1e85fe
SHA256
0396e725a791370ac2c97397bc25870c37508b86cc3f28c0b21d0df8da6ec846
SHA512
cfc3e137c55956e390b154060bf8f33d25c2453ee69c941ce652422f91b15118abbcd7ef6d4971983cf2b15cbf535e7a27173cb02104c3c29550f6756f770bf5
SSDEEP
768:TxtoNlAx4AzdzQdy4DzsTHwaPxBzlc88Zr4:Txt6WIzUwaP/U4
Checks for missing Authenticode signature.
resource |
---|
05fda0f3f3ed35ed17f6ccefca40f57b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
lstrlenA
GetTempPathA
GetSystemTime
lstrcpynA
lstrcatA
CreateThread
GetLastError
WaitForSingleObject
VirtualAlloc
GetLocaleInfoA
GetModuleHandleA
MoveFileExA
FreeLibrary
GetSystemDirectoryA
GetCurrentThreadId
SystemTimeToFileTime
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
lstrcpyA
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
GetFileSize
CreateFileA
OpenProcess
MoveFileA
GetVolumeInformationA
lstrcmpA
CreateEventA
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetVersion
Sleep
CloseHandle
ExitProcess
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
WritePrivateProfileStringA
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
InflateRect
PostMessageA
FindWindowA
LoadCursorA
GetMessageA
GetWindowThreadProcessId
GetWindowRect
CreateWindowExA
RegisterClassExA
DefWindowProcA
SetWindowsHookExA
wsprintfA
DispatchMessageA
EqualRect
TranslateMessage
ClientToScreen
GetCursorPos
GetFocus
LoadIconA
GetCaretPos
CallNextHookEx
IsWindowVisible
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegEnumValueA
RegDeleteKeyA
RegCreateKeyExA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
MjxInst
MjxRun
MjxShutdown
MjxStartup
MjxTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ