hhh
iii
Static task
static1
Behavioral task
behavioral1
Sample
48a80104f46d16fb6ced1209e522e3fc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48a80104f46d16fb6ced1209e522e3fc.dll
Resource
win10v2004-20231222-en
Target
48a80104f46d16fb6ced1209e522e3fc
Size
26KB
MD5
48a80104f46d16fb6ced1209e522e3fc
SHA1
80ea33f0fffbdac0dc0b3b866a45c86243339c13
SHA256
0800fa7686a5181254e98bbc2d146eaafd94bab3cf2371ce263320ea8d392fa4
SHA512
2297c3fdfca74baaf21a302c5a53d3c14c56c0115de68b453d14252390525b5b7673927e2731836f15d2b4be96f0f0449e6d5b761ba39700b047bfae8efd3270
SSDEEP
384:2WIRL58cHpED/X/KkquvWrpUHg0jawWz4pXpP4H3hN/D4J7Q3CHKruHM8Znbx6:2DJ583Df/LDYsnWEpGhNrcUU6u7Z16
Checks for missing Authenticode signature.
resource |
---|
48a80104f46d16fb6ced1209e522e3fc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentThreadId
CallNextHookEx
GetWindowTextA
FindWindowA
GetWindowThreadProcessId
SetWindowsHookExA
_stricmp
_strlwr
_strcmpi
_strupr
_strnicmp
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
wcslen
hhh
iii
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ