nnn
ooo
Static task
static1
Behavioral task
behavioral1
Sample
556dd72a48a53bfd07acfa7aa4a7605f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
556dd72a48a53bfd07acfa7aa4a7605f.dll
Resource
win10v2004-20231215-en
Target
556dd72a48a53bfd07acfa7aa4a7605f
Size
29KB
MD5
556dd72a48a53bfd07acfa7aa4a7605f
SHA1
5a9bfb14490e89aa7301ff5cb372d9a676ad56a8
SHA256
ff7ba29a7f4cba68ea59c288a7de63523b82629f4aaab027abe95536a0f33a44
SHA512
44671aabb9d27c492523a7b0a322b318b7093688a036059a402071430f40d52cf59c12e5d1c2692989120cc83acbdf20478020dd8d54a60ec1e66345e2d3bbd6
SSDEEP
384:9uCGobELJpg6BeHwGJjmBVZtnOqC/pIXogK2l54Z7NeZDGhvE6Qs5g2GEmfUOnWy:IV7Bw5cB1M/p6K2l5KNeZDc9dSU7wRl9
Checks for missing Authenticode signature.
resource |
---|
556dd72a48a53bfd07acfa7aa4a7605f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualProtect
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
GetTickCount
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
GetCurrentProcessId
CreateMutexA
GetLastError
ExitProcess
lstrcatA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
OpenThread
CreateThread
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
strchr
fclose
fread
fopen
_stricmp
_strupr
_strcmpi
_strlwr
strncpy
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
wcslen
strstr
atoi
??3@YAXPAX@Z
nnn
ooo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ