LookUpTargetProcess
Second
Third
Static task
static1
Behavioral task
behavioral1
Sample
1962a7103c37ee110ccc5651a79a2208.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1962a7103c37ee110ccc5651a79a2208.dll
Resource
win10v2004-20231215-en
Target
1962a7103c37ee110ccc5651a79a2208
Size
23KB
MD5
1962a7103c37ee110ccc5651a79a2208
SHA1
2da7231281a04e7c8576f6a6eb8a9ff68ab55f78
SHA256
15086f4ca115f64cae19eea62e7c7aef187658e766cc6330d8b17b501659a6fb
SHA512
30d9792a2aa372554152ece3dcddc9b7b7d75785f706edafbffc82ee73656144f67297614f3198a552170b44926f33a8cf2edf6e837d3ffcbbe7d455ab3533c5
SSDEEP
384:dm8i0UgXbYLI/qHcrSWUymJkWD7coaoFjZ+bXGgfRpKiv:dmZav29vcoFZ+S6R7
Checks for missing Authenticode signature.
resource |
---|
1962a7103c37ee110ccc5651a79a2208 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
lstrlenW
OpenProcess
LoadLibraryW
GetProcAddress
FreeLibrary
Sleep
GetModuleHandleW
WriteProcessMemory
CreateRemoteThread
lstrcmpW
ExitProcess
SetProcessWorkingSetSize
GetCurrentProcessId
CloseHandle
FindFirstFileW
RemoveDirectoryW
DeleteFileW
FindNextFileW
FindClose
ReadProcessMemory
MultiByteToWideChar
CreateFileW
ReadFile
CreateThread
GetDateFormatW
GetTimeFormatW
GetCurrentDirectoryW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetLastError
GetCurrentProcess
lstrcpyW
lstrcatW
GetModuleFileNameW
RtlUnwind
GetFocus
EnumChildWindows
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowThreadProcessId
FindWindowExW
GetParent
SendMessageW
GetClassNameW
wsprintfW
CallNextHookEx
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUrlCacheEntryInfoW
GetAdaptersInfo
LookUpTargetProcess
Second
Third
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ