fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
0b168d38f2ba21db8508cbfa863f5b03.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b168d38f2ba21db8508cbfa863f5b03.dll
Resource
win10v2004-20231215-en
Target
0b168d38f2ba21db8508cbfa863f5b03
Size
8KB
MD5
0b168d38f2ba21db8508cbfa863f5b03
SHA1
1438fd4bba7f571aabd2742673c4b0bc530253f0
SHA256
a8aa1b539ef5f9577dc7db3e26f27c06516f3646ebd9bafb1646988b2b459b85
SHA512
7ab14543bd8107f006acbf2fa1cac11685dd6308fdf106656cd26e40c64e1a5da27d7e858a3739a2ac809a435f1c15abcb414672bbd37a93a266d58c360d959a
SSDEEP
96:lzvcZ/s6Qug9dwoY7V8QwU2LjDUg+mvik9WLb7VvGafkNp62G8:tcZ/cugrUPHHpR862G
Checks for missing Authenticode signature.
resource |
---|
0b168d38f2ba21db8508cbfa863f5b03 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
Sleep
VirtualProtectEx
WideCharToMultiByte
ReadProcessMemory
GlobalLock
GlobalAlloc
IsBadReadPtr
GetCurrentProcess
CreateThread
GlobalFree
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
_adjust_fdiv
malloc
_initterm
free
_stricmp
strcmp
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ