ooo
ppp
Static task
static1
Behavioral task
behavioral1
Sample
179afe9eb486816da821e47c82e59660.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
179afe9eb486816da821e47c82e59660.dll
Resource
win10v2004-20231215-en
Target
179afe9eb486816da821e47c82e59660
Size
28KB
MD5
179afe9eb486816da821e47c82e59660
SHA1
b9394349fc3af2c0bede29202d9f808885b2f1a3
SHA256
24ac4949b92031a20df34e0c13f2c9c38d045aa75890de5b3b548637ddaae353
SHA512
eb29c2cb26ac39c8897af007e5ccde18941d4c5c92335e4225e656841f433b1817aeec981f9ca6083d92b9c6490d198882091329b67fcc9c6a3078f80fdf96a7
SSDEEP
768:xs1x4mlhcXve5mFAD9DghSuvlSmIwWWL:xsrEXvKxMSYL
Checks for missing Authenticode signature.
resource |
---|
179afe9eb486816da821e47c82e59660 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
SetFilePointer
GetModuleFileNameA
GetTickCount
ExitProcess
VirtualProtectEx
WideCharToMultiByte
GetProcAddress
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetModuleHandleA
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
LoadLibraryA
CreateThread
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
GetWindowThreadProcessId
CallNextHookEx
GetClassNameA
GetForegroundWindow
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
PathFileExistsA
strncpy
strchr
fclose
fread
fopen
_strcmpi
_strlwr
_strupr
_stricmp
??3@YAXPAX@Z
atoi
strstr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
ooo
ppp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ