fx
fy
Static task
static1
Behavioral task
behavioral1
Sample
3f32c4cc3ca855c0b1ce0feb760f31bc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f32c4cc3ca855c0b1ce0feb760f31bc.dll
Resource
win10v2004-20231215-en
Target
3f32c4cc3ca855c0b1ce0feb760f31bc
Size
31KB
MD5
3f32c4cc3ca855c0b1ce0feb760f31bc
SHA1
c22d4b41dcd9fa2bb017f38965c7e1939c70e3b5
SHA256
e915234235477cf002f1575722654dadcad946ea2effefbbb153991ade08c848
SHA512
54b93d1b56de43eefeb6211a64a0b8fb6d1ff5b5e9facd6bb367714014ca4380ad038a6a31fae4c163fba56921aeee1aa8721e514e66d1a12c9818976bb88bc2
SSDEEP
768:Ixpee1RDgfRJF/3D3VvjKSTFQ6ZILzvxAIFH+Sul:Ixpr1VgfHF/3rV9Ove
Checks for missing Authenticode signature.
resource |
---|
3f32c4cc3ca855c0b1ce0feb760f31bc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ResumeThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetModuleFileNameA
GetProcAddress
ReadProcessMemory
GetCurrentProcess
GetModuleHandleA
GetPrivateProfileStringA
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
CloseHandle
ReadFile
CreateFileA
WideCharToMultiByte
MultiByteToWideChar
CreateProcessA
VirtualAlloc
ExitProcess
GetSystemDirectoryA
GetCurrentThreadId
DisableThreadLibraryCalls
SetFilePointer
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
lstrlenA
TerminateProcess
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
LoadLibraryA
GetLastError
GetWindowThreadProcessId
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
FindWindowA
GetWindowTextA
GetForegroundWindow
RegSetValueExA
RegCloseKey
RegCreateKeyExA
ImageLoad
ImageUnload
PathFileExistsA
fread
fopen
strcmp
wcslen
_strupr
_stricmp
_strlwr
_strcmpi
fclose
strstr
strchr
strncpy
??3@YAXPAX@Z
atoi
strcat
sprintf
strcpy
??2@YAPAXI@Z
memcpy
strrchr
memset
rand
srand
strlen
InternetCloseHandle
InternetReadFile
fx
fy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ