DoWorkEx
DoWorkWl
Static task
static1
Behavioral task
behavioral1
Sample
23713d20c2dda4f21b746daab3105ce5.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23713d20c2dda4f21b746daab3105ce5.dll
Resource
win10v2004-20231215-en
Target
23713d20c2dda4f21b746daab3105ce5
Size
30KB
MD5
23713d20c2dda4f21b746daab3105ce5
SHA1
1c206278506a09b17571bf1d24e2e5f38fd3994f
SHA256
86291af7ddc5375c7112c95255766a98d19b5f6f5fc7a8c30d99ad26f063de78
SHA512
dd869734e1ee1fe0d9ef5263afdc16f0083878130e123f9b3977c2e910a0c24399b07de487860cb4d0f7ccfb9c16a9fefb230458e72df8219f392294cb2961a4
SSDEEP
192:VX9X9m32cyfop26KaomoLKrc6cH9zHJE4rySt80Noj9g:VXRO2jFpeVcHw4rySt5b
Checks for missing Authenticode signature.
resource |
---|
23713d20c2dda4f21b746daab3105ce5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CloseHandle
WriteFile
CreateFileA
lstrcmpiA
GetModuleFileNameA
DisableThreadLibraryCalls
CreateThread
SetFileTime
GetFileTime
GetEnvironmentVariableA
Sleep
DeleteFileA
FreeLibraryAndExitThread
ExitProcess
WaitForSingleObject
GetProcAddress
lstrcmpA
ReadFile
SetFilePointer
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
VirtualFreeEx
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
MultiByteToWideChar
GetCurrentProcess
lstrcpyA
FreeLibrary
CreateEventA
LoadLibraryA
WaitForInputIdle
wsprintfA
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
__CxxFrameHandler
_adjust_fdiv
malloc
_initterm
free
_except_handler3
memcpy
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_EH_prolog
strchr
DoWorkEx
DoWorkWl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ