fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
108df34e8051d79efb3ba01255b4a169.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
108df34e8051d79efb3ba01255b4a169.dll
Resource
win10v2004-20231215-en
Target
108df34e8051d79efb3ba01255b4a169
Size
7KB
MD5
108df34e8051d79efb3ba01255b4a169
SHA1
146d49f5f299b02084bee6a946552dd674576b32
SHA256
2c88685a5f3514e63426a10e90e850176df64d04c5a9b527520f4319696bb2c6
SHA512
bbf5b92479da11be23adada8f01aac6b2d927a07cd3a5e90232891a1a293722be86e3ff6349b9261e8c0e7c75ecd7521947581bd017156dbd05c1e7a03a4144a
SSDEEP
96:HOUbuOLcGk4MnFsLCiLfcu5XqVlgXvD6aoePuYZYGaflwSwJ:uWuocGk4MnF4LF5Xwq6LebYRWhJ
Checks for missing Authenticode signature.
resource |
---|
108df34e8051d79efb3ba01255b4a169 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
Sleep
VirtualProtectEx
GlobalFree
ReadProcessMemory
GlobalLock
GlobalAlloc
GetCurrentProcess
GetCommandLineA
CreateThread
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_adjust_fdiv
malloc
_stricmp
_initterm
free
strlen
??3@YAXPAX@Z
memcpy
strrchr
memset
strcpy
strcmp
strcat
sprintf
??2@YAPAXI@Z
strncpy
strstr
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ