?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
4227d5f0bbd6617fe689ee0bdd303230.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4227d5f0bbd6617fe689ee0bdd303230.exe
Resource
win10v2004-20231215-en
Target
4227d5f0bbd6617fe689ee0bdd303230
Size
96KB
MD5
4227d5f0bbd6617fe689ee0bdd303230
SHA1
effa6c6ed0bac197afb012381e27eafc7ee2100d
SHA256
b96576d0194d0d1bf3dfe4418df9739bee8a8fe20c5aba8a708d7302a0da71ff
SHA512
7b24dd488fa1ad1aee294ea0dba1ab16492f5b38226ec390d2d33a828f1ffe17434f59e3d4d9b8d9058487d44d1c2fab6d306889abca33f4217e9b0c6742812c
SSDEEP
1536:IU0kJZWqjqPNe+khV/tKyXzk5erWLUHXfbOk5lkscOBPGCdiTe2Q6LEnotA:CkJZPjwkhyyjksrWLUTJPRBO3eSHt
Checks for missing Authenticode signature.
resource |
---|
4227d5f0bbd6617fe689ee0bdd303230 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleBaseNameA
GetCurrentProcess
HeapFree
WaitForSingleObject
VirtualFree
GetProcessHeap
TlsSetValue
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
HeapAlloc
GlobalFree
LoadLibraryA
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualQuery
TlsGetValue
GetFileSize
CreateFileA
ReleaseSemaphore
CreateSemaphoreA
VirtualAlloc
SetScrollInfo
UpdateWindow
SetWindowTextA
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
ModifyMenuA
SendMessageA
GetWindowRect
DestroyWindow
GetActiveWindow
DrawTextA
GetWindowInfo
GetDC
ReleaseDC
SetWindowPos
FindWindowA
GetForegroundWindow
MoveWindow
MoveToEx
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
BitBlt
CreatePen
_except_handler3
memset
?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ