fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
0b839b54dc5ae50b1d76a899a9d17438.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b839b54dc5ae50b1d76a899a9d17438.dll
Resource
win10v2004-20231222-en
Target
0b839b54dc5ae50b1d76a899a9d17438
Size
9KB
MD5
0b839b54dc5ae50b1d76a899a9d17438
SHA1
61400c32afb6965a9ddf8240bff516bae8135221
SHA256
b0ad2152f2139d543cbbf047c0ddcee3e60178da811f2e734aa16df18edd2eb5
SHA512
3b420b4167ddce6a150a8e03571675e2524a31b11179c925356da0b799d219df7cd9143d6e73dbc0ea2362bca000929102a9becbfd87855235ec393430950e98
SSDEEP
96:LapT99PQtwnBnbYh8Y6kvTUbmee3fEICr2c/dd1C4pXmEaflMMI6g53:LaP9Its0RDey/TCWL2MIt53
Checks for missing Authenticode signature.
resource |
---|
0b839b54dc5ae50b1d76a899a9d17438 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateThread
GlobalFree
IsBadReadPtr
GetPrivateProfileStringA
Sleep
WriteProcessMemory
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
_adjust_fdiv
_stricmp
malloc
_initterm
free
memset
??3@YAXPAX@Z
strcat
strrchr
strcpy
sprintf
??2@YAPAXI@Z
strlen
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ