fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
49f8246116737e242dbf1a917943e303.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49f8246116737e242dbf1a917943e303.dll
Resource
win10v2004-20231215-en
Target
49f8246116737e242dbf1a917943e303
Size
10KB
MD5
49f8246116737e242dbf1a917943e303
SHA1
2673820199f12cc711e0134cf9c11d4e44435fdb
SHA256
ba7a3d0c3c6add4ed2ab825cdb1db6f917827e6bd00c426166277ba03eeaa82e
SHA512
cf739391077b8e3d76f2bd56b2d7adc6c6b4242d7414c6418d6170083d4afdfaf28ded0fd0aa272f658072056bc41640a0817346b301e149e2bcbb6fd7933b03
SSDEEP
192:KdlmrDjP1wUykHkqIJFuHY/+yksOJU1JmqHPwG+8:KnKjP1wUykHkqIuHAZjT1JLvH
Checks for missing Authenticode signature.
resource |
---|
49f8246116737e242dbf1a917943e303 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
ExitProcess
GetCurrentProcessId
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateThread
GetCurrentProcess
GlobalFree
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
memset
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strcmp
strcat
strrchr
??3@YAXPAX@Z
_stricmp
??2@YAPAXI@Z
sprintf
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ