fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
4c3889d7ab7faa1fd216a8bbcbd346b0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c3889d7ab7faa1fd216a8bbcbd346b0.dll
Resource
win10v2004-20231222-en
Target
4c3889d7ab7faa1fd216a8bbcbd346b0
Size
7KB
MD5
4c3889d7ab7faa1fd216a8bbcbd346b0
SHA1
74d503e08696ac3bd57031613f4dead3d4261801
SHA256
bee49bdb8af515650b1903eeb715b7030f647397dc85c6de6c99bb5c4e5b9c7e
SHA512
e3e8bf7b332fd297e31568bece6c27b38a6341b5d5cd040980955dce2b0f3c32d08b7b635d35fe699a66fe6efe6e6fb91ee3921796736e7dfabd837a52cb5d8f
SSDEEP
96:vEinDfhEOCVnGXj2+SXdpDU02GgMQWwl0afF9Wy2:vpnL6fGXj2+GdpAG0WwpFky2
Checks for missing Authenticode signature.
resource |
---|
4c3889d7ab7faa1fd216a8bbcbd346b0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
Sleep
GetCommandLineA
GlobalFree
GetProcAddress
GlobalLock
GlobalAlloc
VirtualProtectEx
GetCurrentProcess
CreateThread
ReadProcessMemory
GetModuleFileNameA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
_adjust_fdiv
strrchr
memset
strcpy
strcmp
strcat
sprintf
strncpy
strstr
strlen
memcpy
free
_initterm
malloc
_stricmp
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ