LsMbxdhVm
KmIaxnwkdIctkkbRjkaz
Static task
static1
Behavioral task
behavioral1
Sample
65edfea13e1d0f730a10faebcd4c38da.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65edfea13e1d0f730a10faebcd4c38da.exe
Resource
win10v2004-20231215-en
Target
65edfea13e1d0f730a10faebcd4c38da
Size
61KB
MD5
65edfea13e1d0f730a10faebcd4c38da
SHA1
25988110800084da53dae17b0638c75c1e14f66b
SHA256
c18fe8914bcf38a79e4b8d564dcf45331514d8a82e13b84d317b5fa090114b5d
SHA512
0365b298564098f917b2733f764dfcd15e5e03fb84987e7659f48a0c9a9e4db225d2cc71dfb8be8263fd90afc6dd16f25873bcfbbc5b940b496a8879cd682085
SSDEEP
1536:zKZ+6x6qhTgAHSO1sXzdbmoJ3ZlfZJxNML33dI:WZ+6x6U1149JJfJvm9
Checks for missing Authenticode signature.
resource |
---|
65edfea13e1d0f730a10faebcd4c38da |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteProfileSectionW
ExitProcess
WriteProfileSectionA
GetProfileIntW
VirtualFreeEx
GetDateFormatW
GetEnvironmentVariableW
LockFileEx
OutputDebugStringA
VirtualAlloc
MapViewOfFileEx
RemoveDirectoryW
GetModuleHandleA
FindResourceExA
VirtualAlloc
InterlockedExchangeAdd
GetProcessTimes
VirtualFree
GetLogicalDriveStringsW
IsBadStringPtrA
MultiByteToWideChar
GetCurrentDirectoryA
GetLastError
VirtualAllocEx
LockFileEx
GetModuleFileNameA
GetPrivateProfileStringA
WriteProfileSectionW
LoadLibraryA
LockFile
EndUpdateResourceA
SearchPathA
_mbsrev
_get_osfhandle
free
__p__winminor
_fcloseall
memcpy
ispunct
rand
is_wctype
_localtime64
__p___wargv
frexp
SetDIBitsToDevice
GetTextMetricsW
GetPixel
SetBkColor
GetObjectW
GetDIBits
SetPaletteEntries
CreateDIBSection
GetDeviceCaps
GetWindowTextLengthW
UpdateWindow
SetDlgItemTextW
GetWindowTextW
SetCursor
GetClassNameW
LoadIconA
mciGetDeviceIDFromElementIDA
waveInReset
NotifyCallbackData
waveInGetDevCapsA
midiStreamOut
mmioStringToFOURCCA
sndPlaySoundW
mciSetDriverData
LsMbxdhVm
KmIaxnwkdIctkkbRjkaz
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ