fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
3fe54b2ceff87ca32b40184db9e4894c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fe54b2ceff87ca32b40184db9e4894c.dll
Resource
win10v2004-20231215-en
Target
3fe54b2ceff87ca32b40184db9e4894c
Size
7KB
MD5
3fe54b2ceff87ca32b40184db9e4894c
SHA1
39efbcf1f0b9e23a1ffe95754d082766052c468a
SHA256
a85336ca0ab2f40fc00a48206ed02d06df11c12890b95ec1baa70dfe8b476aba
SHA512
e8803e4811122793706acfcca044a3295e43b69150136322d7288570e076bb2156b6d308a3065f10fe7c59e0137682271021bd5e8a070e42051e7cc3ce4d5e8e
SSDEEP
96:VwSlbcjhipiyftRg91MzaC4dS2li+yLVJOJmqkM7nhc6:HcQpiIsPiDVgJmqrhr
Checks for missing Authenticode signature.
resource |
---|
3fe54b2ceff87ca32b40184db9e4894c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Sleep
GetCurrentProcess
ExitProcess
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcat
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ