fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
4500251b4c38b5dfe5b4c15229f04cf9.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4500251b4c38b5dfe5b4c15229f04cf9.dll
Resource
win10v2004-20231222-en
Target
4500251b4c38b5dfe5b4c15229f04cf9
Size
9KB
MD5
4500251b4c38b5dfe5b4c15229f04cf9
SHA1
b45bf624e16cf1f1ff04af7ca0c28bbeed18801f
SHA256
8ae2bb97e5569d7533558fc07425b1f231f3e55cffbdef0b9cff82ddb1f91656
SHA512
7d70603f88cbcb78e6a538c48b5db50bc55800185362c568055955208c3c50a24422718a98e1db41d89ee8bb6ed6da94d8e020d4c5941c9661b7988daf0b5e08
SSDEEP
96:FukIDzKF4OPr8s6DeZjOYWYUnBWxkAVcs7tDfEydpHKwdyj38APTGlsyaf38hCZP:azCPrNrFWfBPcc4dpHKbTDPqKlZ3
Checks for missing Authenticode signature.
resource |
---|
4500251b4c38b5dfe5b4c15229f04cf9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
Sleep
GetCommandLineA
GlobalFree
GetModuleHandleA
GetCurrentProcess
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
VirtualProtectEx
CreateThread
ReadProcessMemory
SetWindowsHookExA
GetAsyncKeyState
ToAscii
CallNextHookEx
GetKeyboardState
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
strcat
_adjust_fdiv
malloc
_initterm
free
memset
strlen
strstr
memcpy
strrchr
strcpy
strcmp
_stricmp
sprintf
??2@YAPAXI@Z
strncpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ