ppp
qqq
Static task
static1
Behavioral task
behavioral1
Sample
1421dad25aad4bf17885e422a9ee0678.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1421dad25aad4bf17885e422a9ee0678.dll
Resource
win10v2004-20231222-en
Target
1421dad25aad4bf17885e422a9ee0678
Size
24KB
MD5
1421dad25aad4bf17885e422a9ee0678
SHA1
474134852f3159e7f2a448ede937ef99deedcf70
SHA256
92e34b54bb87ecee49c7e9e11c0ac5f47b5259e259ad8de304b0442e63ee3841
SHA512
e91f622c1792e4573bfbde2b3c2b2389b26e5d500c07dcc8f065157953d2f7c8212889557ace9b07ab09958dda79af4d78ab42d54589571d0d608bda54da7f0c
SSDEEP
384:i4puf1OSRuSFDyILsUySbgM/8XsZUL0MhNOlFDjOAXTrZW3fGlC+OU6:gf1nPKUySbgnXsewMhNOlFDj93c3ulCP
Checks for missing Authenticode signature.
resource |
---|
1421dad25aad4bf17885e422a9ee0678 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
SetFilePointer
GetCurrentProcessId
VirtualProtectEx
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WriteProcessMemory
CreateMutexA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
UnhookWindowsHookEx
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
GetForegroundWindow
InternetCloseHandle
InternetReadFile
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
strcat
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
ppp
qqq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ