fx
fy
Static task
static1
Behavioral task
behavioral1
Sample
24529b57592cab777f2bef077371d1a5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24529b57592cab777f2bef077371d1a5.dll
Resource
win10v2004-20231222-en
Target
24529b57592cab777f2bef077371d1a5
Size
29KB
MD5
24529b57592cab777f2bef077371d1a5
SHA1
e706eec9a7bc241e5a9a11b1b78b325fa9e18a0a
SHA256
2ed0c019aea426ebe388dbab944dc666955049d140711f40020fe2d6282bf540
SHA512
a9da60a7ebc15d6a77012607325d11867380c7d398171b5510835d32948a75868aa9dc9c99874b0ff0f4cc07e5f4f477c3515470e4f02ff01617047abc50fe8c
SSDEEP
768:W8FUAwQo/5TokcfmQrDNDe+9G441KpIsuHTdA:WUP6cXd9G4KKGHRA
Checks for missing Authenticode signature.
resource |
---|
24529b57592cab777f2bef077371d1a5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
LoadLibraryA
GetModuleHandleA
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
ReadProcessMemory
GetCommandLineA
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
VirtualAlloc
GetTempPathA
CreateFileA
ReadFile
CloseHandle
GetLocalTime
DeleteFileA
Sleep
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
SetUnhandledExceptionFilter
GetLastError
FindWindowA
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
GetKeyboardState
GetWindowThreadProcessId
ToUnicode
InternetCloseHandle
InternetReadFile
??3@YAXPAX@Z
strchr
fclose
fread
fopen
_strcmpi
_stricmp
_strupr
_strlwr
atoi
strrchr
wcslen
memset
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
fx
fy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ