fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
24ff84d639439ff9aa015e3b8f89f923.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24ff84d639439ff9aa015e3b8f89f923.dll
Resource
win10v2004-20231215-en
Target
24ff84d639439ff9aa015e3b8f89f923
Size
14KB
MD5
24ff84d639439ff9aa015e3b8f89f923
SHA1
fcf1a965ac26a66159953eee90ba9fef877aad13
SHA256
179e77e69e05b0cdc50c876c05c5eadb2abfd439a919fa1bc26e7f79f8856e6a
SHA512
754bbd78d89b9830806f94ba2c5b70a25b7ffa3684aaef50e6d649c89f93e7c82f9e899d243bc4ac044a08dd6fb389b35b3115901a1a70034ab74c0cbd96c1cc
SSDEEP
192:hcZ/cugrUPZjpRr2G6fRXXWhpGGVvR51p5DSQu15GteQZv8hhtt+3fSj2G2An:hcZ/cugwPtP36JopGGVvR51p+Ast+8j
Checks for missing Authenticode signature.
resource |
---|
24ff84d639439ff9aa015e3b8f89f923 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
Sleep
VirtualProtectEx
WideCharToMultiByte
ReadProcessMemory
GlobalLock
GlobalAlloc
IsBadReadPtr
GetCurrentProcess
CreateThread
GlobalFree
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
_adjust_fdiv
malloc
_initterm
free
_stricmp
strcmp
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ