fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
5c4a3ecf3ffb9046e3b0de5129a4301b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c4a3ecf3ffb9046e3b0de5129a4301b.dll
Resource
win10v2004-20231222-en
Target
5c4a3ecf3ffb9046e3b0de5129a4301b
Size
10KB
MD5
5c4a3ecf3ffb9046e3b0de5129a4301b
SHA1
655fda593640f76a71231d5a8c3ca08160ea5f26
SHA256
b74f6e951671005dda836839ae6ba514e018602db68463c94be44acdf9d9a560
SHA512
b8b992a5d1bb3cf3abeeb50056b31086aee2aa9179102b7fecca6b38ebb1ae5e532a4ac078ad8cc26aa2c1383903c62faae9e4388304d1ba2da7065baa9ceb88
SSDEEP
192:HmKR9mC2IsTs4l6t3RRt1WWkSQtpfKdALjwMKy:G29P2I9eYPiyQtqAPwZ
Checks for missing Authenticode signature.
resource |
---|
5c4a3ecf3ffb9046e3b0de5129a4301b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadReadPtr
CreateThread
VirtualProtectEx
GetCurrentProcess
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
Sleep
GetCommandLineA
GlobalFree
ReadProcessMemory
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
ToAscii
SetWindowsHookExA
CallNextHookEx
GetAsyncKeyState
GetKeyboardState
UnhookWindowsHookEx
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
_adjust_fdiv
malloc
_initterm
free
strstr
strncpy
_stricmp
??2@YAPAXI@Z
sprintf
strlen
memcpy
strrchr
strcpy
memset
strcmp
strcat
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ