_IFoundSecret@12
_ITestThisProc@16
Static task
static1
Behavioral task
behavioral1
Sample
4758ee5d712b0a0fc25c97e318b29fe1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4758ee5d712b0a0fc25c97e318b29fe1.exe
Resource
win10v2004-20231222-en
Target
4758ee5d712b0a0fc25c97e318b29fe1
Size
95KB
MD5
4758ee5d712b0a0fc25c97e318b29fe1
SHA1
bf785e930d891da1bcdf967b3b13702604e0ff6a
SHA256
f0033dc5f77cb9a38f3bfee65f8c83fa7e7088b016c44d838c1634d4454152ed
SHA512
bd6a04a2077486eeb2ebd1b4fee292cdb24c8ac149703b8942bbbec008300b780242b86ede4c2ecd7e0f42d9f9a703498e2249617da086085d2d5433da062dc6
SSDEEP
1536:AQHc2WbVljfwoJ7vDtrIlOgwg9Y+oe7qODtB48/3kosiyRf:Ap7VljtVD1ZgW+oehrP/kdp
Checks for missing Authenticode signature.
resource |
---|
4758ee5d712b0a0fc25c97e318b29fe1 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
InternetCloseHandle
InternetOpenA
CoGetClassObject
CoTaskMemFree
CoGetMalloc
CoTaskMemAlloc
ReleaseMutex
HeapAlloc
GetProcessHeap
ExitProcess
HeapFree
WriteFile
OpenProcess
WriteProcessMemory
LoadLibraryA
MoveFileA
WaitForMultipleObjects
CompareStringA
CloseHandle
GetCurrentProcessId
CreateMutexA
InvalidateRect
SetWindowLongA
GetForegroundWindow
ShowCursor
GetWindowLongA
CreateMenu
GetWindowInfo
LoadBitmapA
GetWindowRect
SetCursor
PostMessageA
GetCursor
ModifyMenuA
DrawTextA
GetDC
GetActiveWindow
DestroyWindow
CreateWindowExA
SetWindowTextA
DrawFrameControl
GetWindow
MoveWindow
DrawEdge
ReleaseDC
ShowWindow
ExtFloodFill
DrawEscape
DeleteDC
InvertRgn
CreateFontIndirectA
BeginPath
ExtCreatePen
GetPath
CreateDIBPatternBrush
SelectObject
PolyDraw
CreateCompatibleDC
CreateCompatibleBitmap
ExtCreateRegion
EndPath
PathToRegion
ExtTextOutA
GetBitmapBits
SetBitmapBits
CreateFontIndirectW
StretchBlt
CreateBitmap
CreateDCA
DeleteObject
_IFoundSecret@12
_ITestThisProc@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ