fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
1bd5fb4af34b64c3e70ae48685839e30.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bd5fb4af34b64c3e70ae48685839e30.dll
Resource
win10v2004-20231215-en
Target
1bd5fb4af34b64c3e70ae48685839e30
Size
10KB
MD5
1bd5fb4af34b64c3e70ae48685839e30
SHA1
739f3ce948ee9fa00a5ccd085cf24f867d491f5a
SHA256
d9a41f7180e5790bc4565f4293e714e92b5d2c2bdcbf8f2077f2ab45302c418e
SHA512
5a97cc1c3eb5feea3287c0a522798f37df1b352cf61a205c0ef65b7afb527887120975e1d1998fcbe725a15fbdd960d27927fa5d719b9b2909eaa8e5fd3181f7
SSDEEP
96:rWyGd9pqkTQnjI47J/73Xl/Zc7NfEHhpfK0Sx7mmGE/hafnN1njD5y70:rWyGd96jJZZcApfK9SmG33jFy7
Checks for missing Authenticode signature.
resource |
---|
1bd5fb4af34b64c3e70ae48685839e30 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
Sleep
VirtualProtectEx
GlobalFree
ReadProcessMemory
WideCharToMultiByte
GlobalAlloc
IsBadReadPtr
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
CreateThread
GetModuleFileNameA
GlobalLock
GetCurrentProcess
CallNextHookEx
SetWindowsHookExA
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
_adjust_fdiv
malloc
_stricmp
_initterm
free
strcat
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
strcmp
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ