fx
fy
Static task
static1
Behavioral task
behavioral1
Sample
4e626b56f511a6dda4b8ee4619f6d61d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e626b56f511a6dda4b8ee4619f6d61d.dll
Resource
win10v2004-20231215-en
Target
4e626b56f511a6dda4b8ee4619f6d61d
Size
31KB
MD5
4e626b56f511a6dda4b8ee4619f6d61d
SHA1
4a51f305d786a166e63e21f5a59d3c38c410232d
SHA256
c1f7498b7a35704141f0ac807212518e8e5dafd06c427dda21ca4eae26653422
SHA512
f46cfa4f00e1ca1128eacccea616b4322f3da25f9659a39d0c2a101caae63a5a1d64c1f9735344fa9a09d3ccb9c034638d98a167841d60ca51455b00d98edf6d
SSDEEP
768:Ixpee1RDgfRJF/3D3VvjKSTFQ6ZILzvxAIFH+Su4:Ixpr1VgfHF/3rV9Ovj
Checks for missing Authenticode signature.
resource |
---|
4e626b56f511a6dda4b8ee4619f6d61d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ResumeThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetModuleFileNameA
GetProcAddress
ReadProcessMemory
GetCurrentProcess
GetModuleHandleA
GetPrivateProfileStringA
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
CloseHandle
ReadFile
CreateFileA
WideCharToMultiByte
MultiByteToWideChar
CreateProcessA
VirtualAlloc
ExitProcess
GetSystemDirectoryA
GetCurrentThreadId
DisableThreadLibraryCalls
SetFilePointer
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
lstrlenA
TerminateProcess
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
LoadLibraryA
GetLastError
GetWindowThreadProcessId
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
FindWindowA
GetWindowTextA
GetForegroundWindow
RegSetValueExA
RegCloseKey
RegCreateKeyExA
ImageLoad
ImageUnload
PathFileExistsA
fread
fopen
strcmp
wcslen
_strupr
_stricmp
_strlwr
_strcmpi
fclose
strstr
strchr
strncpy
??3@YAXPAX@Z
atoi
strcat
sprintf
strcpy
??2@YAPAXI@Z
memcpy
strrchr
memset
rand
srand
strlen
InternetCloseHandle
InternetReadFile
fx
fy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ