fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
23ae583db1dd13cea2c04773ca3f55ab.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23ae583db1dd13cea2c04773ca3f55ab.dll
Resource
win10v2004-20231215-en
Target
23ae583db1dd13cea2c04773ca3f55ab
Size
44KB
MD5
23ae583db1dd13cea2c04773ca3f55ab
SHA1
9b45f495bd0d9e946213e5d706514422fd2345a7
SHA256
2efb838b0a54caff3ecefacce9618ac70b441adaeebca1d0360aaaa4ca3ea1f1
SHA512
7c632c884adc820247d491f2c394ff60d035e32cd87fdabb8edede1b911e8ac863b31288317c27a18702853623eba96ddf245d8b18391a3c87500f6afa6b7986
SSDEEP
768:jtLjmYtxT3O8VmKhYBfGaQTDdFa1SoUFuA:hzxT3PVmKuBoTP5oY
Checks for missing Authenticode signature.
resource |
---|
23ae583db1dd13cea2c04773ca3f55ab |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetCurrentProcessId
GetCurrentProcess
Thread32Next
CloseHandle
TerminateThread
GetThreadPriority
GetProcAddress
GetModuleHandleA
Thread32First
Sleep
VirtualProtectEx
WriteProcessMemory
ExitProcess
RtlUnwind
CreateToolhelp32Snapshot
GetModuleFileNameA
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetWindowTextA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ