_6@12
L@24
w@4
_Jj@24
bT
8y
egZ
if
c00@24
_Co@8
Ug@4
1@12
e@20
_E9P
Static task
static1
Behavioral task
behavioral1
Sample
1ccac71be2c3bfba57da85da3bb2556a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ccac71be2c3bfba57da85da3bb2556a.exe
Resource
win10v2004-20231215-en
Target
1ccac71be2c3bfba57da85da3bb2556a
Size
1.7MB
MD5
1ccac71be2c3bfba57da85da3bb2556a
SHA1
a264a0133291894122ee6cd7d7e09cfe546cecfe
SHA256
e5a02248c236c1eac1e2199280c2e34abbb31dcd329802dcef02eb7c69d549df
SHA512
f436cca2bb9a1a5b51851c7959b2d791267462562ab8276385980a88088e2e298b638195abaaa3d6d09a41bd41446e3756a6950dc197fd1fbbc28aebcfc12bb0
SSDEEP
49152:DgmI+j/fumzhTIzvxnL8OjVvX7+zNstcn+9:YFmzhTAVfp69+9
Checks for missing Authenticode signature.
resource |
---|
1ccac71be2c3bfba57da85da3bb2556a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetSysColor
WaitMessage
UpdateWindow
GetCursor
WindowFromPoint
UnregisterClassA
UnhookWindowsHookEx
CreateMenu
GetWindow
TranslateMessage
GetWindowTextLengthA
GetActiveWindow
SHQueryInfoKeyA
PathIsDirectoryA
PathFileExistsA
ExitProcess
IsBadHugeReadPtr
GetCommandLineW
LocalReAlloc
GetCurrentThread
GetCommandLineA
GetLastError
VirtualAllocEx
LocalFree
GetCurrentProcess
GetCurrentThreadId
_6@12
L@24
w@4
_Jj@24
bT
8y
egZ
if
c00@24
_Co@8
Ug@4
1@12
e@20
_E9P
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ