Elc
Jmb
Oxy
Rly
Static task
static1
Behavioral task
behavioral1
Sample
131e07938d9face62ebd9d05b2830d58.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
131e07938d9face62ebd9d05b2830d58.exe
Resource
win10v2004-20231215-en
Target
131e07938d9face62ebd9d05b2830d58
Size
111KB
MD5
131e07938d9face62ebd9d05b2830d58
SHA1
bf1b14c151bd0131182e8962c00ee7bf0bc982b3
SHA256
e728c4b551c43aed28b30cb0fc4d0ea5d6b4f59c12a06b87448da41eb6800bd1
SHA512
85420886cd7c4889f684572785f746727aad429f1d905406ce1e5364bb07bc90bc6cf7a1bee78aca84956bd9e2a1acd038cf239d52c1e19481c8ff7be6430bdd
SSDEEP
3072:DRm+9ppDmJ+MU3gMfTmB+VbqLKMMiU1m9:DzDSWgqTBMLKNP
Checks for missing Authenticode signature.
resource |
---|
131e07938d9face62ebd9d05b2830d58 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
VariantClear
SysAllocStringLen
LoadTypeLib
ControlService
CreateServiceA
DeleteService
InitializeSecurityDescriptor
OpenProcessToken
OpenServiceA
QueryServiceStatus
SetSecurityDescriptorDacl
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
StgCreateDocfileOnILockBytes
CLSIDFromProgID
OleUninitialize
GetRunningObjectTable
DoDragDrop
CreateILockBytesOnHGlobal
CoTaskMemRealloc
CoTaskMemFree
CoRevokeClassObject
CoRegisterMessageFilter
CoCreateInstance
OleSetClipboard
ShowCaret
GetWindowTextA
FillRect
DestroyCursor
CreateAcceleratorTableA
CharUpperA
CharPrevA
SetCursor
SHBindToParent
SHGetFileInfoA
SHFileOperationA
SHAutoComplete
PathFindFileNameA
StrChrA
StrStrIA
PathIsRelativeA
PathUnquoteSpacesA
memset
rand
sscanf
strchr
strcmp
strstr
time
_except_handler3
memchr
getenv
free
fflush
__set_app_type
malloc
GetVersionExA
SetLastError
TlsFree
GetSystemTime
FreeResource
GetVersion
Elc
Jmb
Oxy
Rly
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ