fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
2690d44ea3b19395f3f88f2ef1bdb42c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2690d44ea3b19395f3f88f2ef1bdb42c.dll
Resource
win10v2004-20231215-en
Target
2690d44ea3b19395f3f88f2ef1bdb42c
Size
9KB
MD5
2690d44ea3b19395f3f88f2ef1bdb42c
SHA1
29f707b8bf0159fffd6b75103c9ccfcce0030303
SHA256
5ff9bcc7782ce407905db9c5c96a0d45636b1adb73cc4fd55d3a6b824014ef52
SHA512
9e06d5e45f2abe81cf110a94811861e51b6d6808b96a22bf8c6910da8e7220a79239b300773e0ffa5edf06c6a1be0e68ac0b69dc71f759fa503ebe7c5840cbcb
SSDEEP
96:1apT99PQtSnFKhUY6kvTUbmee3fEW8r2Ctdd1Y4pXmEaflF4TWUe:1aP9It+cJDeQ9ZKWLb4TWUe
Checks for missing Authenticode signature.
resource |
---|
2690d44ea3b19395f3f88f2ef1bdb42c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateThread
GlobalFree
IsBadReadPtr
GetPrivateProfileStringA
Sleep
WriteProcessMemory
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
_adjust_fdiv
_stricmp
malloc
_initterm
free
memset
??3@YAXPAX@Z
strcat
strrchr
strcpy
sprintf
??2@YAPAXI@Z
strlen
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ