tejoOkck@8
RVybblVy@12
Static task
static1
Behavioral task
behavioral1
Sample
08fadfd545ad7d5d43a2697b36c165a9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08fadfd545ad7d5d43a2697b36c165a9.dll
Resource
win10v2004-20231215-en
Target
08fadfd545ad7d5d43a2697b36c165a9
Size
183KB
MD5
08fadfd545ad7d5d43a2697b36c165a9
SHA1
ec5c9c7f5170489f8312adf55649b9f2a8bb7164
SHA256
3af2e7ef85d877b89bf4861860c8c8f0cf193c9c0dfff24f16a9ff01e8ba4ad2
SHA512
0eab3ba301930fdb7c06cb7966e10be9b1e448d0c61d7b468c467cae730ee258601c1b443c0ade3367d0f66b70ac7dd5b11b9db77463accf3d7469232629d778
SSDEEP
3072:NicM7rAGddoQqKNcWwxihV4AHfCr7uPFM3aSjX6PlmOX3T7:NSvndOrKe2VjfLw3+Plmwf
Checks for missing Authenticode signature.
resource |
---|
08fadfd545ad7d5d43a2697b36c165a9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnableWindow
RemoveMenu
MsgWaitForMultipleObjects
FillRect
EnableMenuItem
LoadCursorA
DrawIcon
GetWindowDC
SetWindowPos
EnumThreadWindows
PtInRect
CharUpperA
SetWindowsHookExA
OpenClipboard
DispatchMessageA
CharLowerA
OemToCharA
ShowOwnedPopups
GetSystemMetrics
GetLastActivePopup
SetTimer
GetKeyboardLayout
DestroyCursor
GetMenuStringA
DestroyIcon
GetMenuItemInfoA
IsWindowVisible
PeekMessageW
RegisterClipboardFormatA
SetForegroundWindow
PostMessageA
GetDlgItem
WindowFromPoint
SetPropA
GetCursor
ActivateKeyboardLayout
GetActiveWindow
GetKeyState
RegisterClassA
RemovePropA
ScreenToClient
CharToOemA
CharNextA
DrawFrameControl
PeekMessageA
CharUpperBuffA
TrackPopupMenu
UnregisterClassA
GetClassLongA
DrawAnimatedRects
UnhookWindowsHookEx
GetMenu
GetCapture
KillTimer
GetSubMenu
GetWindowThreadProcessId
SetFocus
SendMessageA
GetWindowTextLengthA
EnableScrollBar
GetKeyboardType
GetMenuItemCount
VerQueryValueA
VerFindFileA
VerInstallFileA
HeapAlloc
SizeofResource
GetCurrentThreadId
SetHandleCount
GetModuleHandleW
CreateThread
FindClose
GetUserDefaultLCID
RaiseException
WaitForSingleObject
ReadFile
SetThreadLocale
GetStringTypeA
GetLocaleInfoA
GetCPInfo
GetModuleHandleA
GetCurrentProcessId
LoadLibraryA
MulDiv
MoveFileExA
ExitProcess
VirtualAlloc
GetLocalTime
GetOEMCP
tejoOkck@8
RVybblVy@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ