a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
2192bb634ea19fa2a6ba996e15444fd9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2192bb634ea19fa2a6ba996e15444fd9.dll
Resource
win10v2004-20231222-en
Target
2192bb634ea19fa2a6ba996e15444fd9
Size
17KB
MD5
2192bb634ea19fa2a6ba996e15444fd9
SHA1
b5b8df3724a4bcbf7de30bec8189897765e80ebc
SHA256
6439b2313ca5ab675e74d980a5b2c4a76ffaca9ba62d3daaa89701385e574c0c
SHA512
6b0bdc2d97369b60e3a5dc3702a82a51441e385605841a8d33b1853d41846f6e67fa118f1e45d1be2465fa3fc2874f436b109e67976fc02dcc62268121d1d790
SSDEEP
384:WHQ6fumqVnKUbVAe3ljg+0+K2W3Ih2zyA1kMDLy7A6/u:WHQ6GmgKUb++ljg+r5ASMfy7xu
Checks for missing Authenticode signature.
resource |
---|
2192bb634ea19fa2a6ba996e15444fd9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
lstrcatA
lstrcmpA
SetFilePointer
CreateEventA
GetModuleFileNameA
MultiByteToWideChar
RtlUnwind
GetModuleHandleA
GetProcAddress
GetTempPathA
GetTempFileNameA
HeapReAlloc
HeapFree
GetProcessHeap
lstrlenA
HeapAlloc
GlobalAlloc
GlobalFree
lstrcpynA
lstrcpyA
InterlockedExchange
GetLastError
OpenMutexA
VirtualQuery
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
IsWindowEnabled
IsWindowUnicode
GetAncestor
CharLowerBuffA
ShowWindow
GetClientRect
GetWindowRect
CreateWindowExW
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
InternetCloseHandle
InternetSetFilePointer
GetFileVersionInfoSizeA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ