ppp
qqq
Static task
static1
Behavioral task
behavioral1
Sample
57130f3fa1fc9cb9670f69f680f233d2.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57130f3fa1fc9cb9670f69f680f233d2.dll
Resource
win10v2004-20231215-en
Target
57130f3fa1fc9cb9670f69f680f233d2
Size
24KB
MD5
57130f3fa1fc9cb9670f69f680f233d2
SHA1
370ed6d82f59c5a096a3483fc36ec0a899dbf130
SHA256
276a3bee9da3146a510cb0a0d283492558bd0a0aad227e53b82d04f23025ea7c
SHA512
f2639eaf6f6a849dd441a959a7fe94e279d9a1f068d16ce1e5d795f5a0d7a98caf9d1f79896dc71afbf1434d146af16331776da1c308c59f2b4ae317fa5ff382
SSDEEP
768:il5VJlqOdUr4NdORkuv6gTuDmi3VXvhxd:i3/lqOjNdOQmwh
Checks for missing Authenticode signature.
resource |
---|
57130f3fa1fc9cb9670f69f680f233d2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcessId
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
SetFilePointer
CreateMutexA
VirtualProtectEx
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
lstrcatA
UnhookWindowsHookEx
GetWindowThreadProcessId
CallNextHookEx
SetWindowsHookExA
GetWindowTextA
GetForegroundWindow
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcat
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
strcmp
ppp
qqq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ