Dispatch
InputFile
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
3a6deddd1c24615d96cd107a7deb6f42.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a6deddd1c24615d96cd107a7deb6f42.dll
Resource
win10v2004-20231215-en
Target
3a6deddd1c24615d96cd107a7deb6f42
Size
388KB
MD5
3a6deddd1c24615d96cd107a7deb6f42
SHA1
cb6ea037d3f0b189fcdf186c29547a6bd4a02cbb
SHA256
2e1320c9880bd82f08ade6a77095cb29523b2f6c569ed448cefdffc08213ff55
SHA512
4d0a15d3921c76a6855a141634df5e2162fde66a6a21cfe16d11cc3da079745c949256ac89a2126fc5c32247d90e30ad88f9988d19c8d2ef98a419f5f89c4442
SSDEEP
6144:muLayxI7hCoFPAiNMdixNQ8CLwBN9/46oSnmlBNicMp1P+4:VaQuhTFPfbzFCMBr/4bSnm3o9h
Checks for missing Authenticode signature.
resource |
---|
3a6deddd1c24615d96cd107a7deb6f42 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord825
tolower
FindNextFileA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDesktopWindow
RegEnumValueA
bind
PathIsDirectoryA
CoCreateInstance
SysAllocString
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Netbios
Dispatch
InputFile
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE