PWDump
SecDump
Static task
static1
Behavioral task
behavioral1
Sample
67ce69b7d8a3e93a8cb169b3ddac0d53.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67ce69b7d8a3e93a8cb169b3ddac0d53.dll
Resource
win10v2004-20231222-en
Target
67ce69b7d8a3e93a8cb169b3ddac0d53
Size
58KB
MD5
67ce69b7d8a3e93a8cb169b3ddac0d53
SHA1
3e2a79f3a1330008a334b0574d71c78702249c2e
SHA256
a582b4f71ab8cf459a4ab4d2f6ff2ffefaa57fd3deafbb8a1b79c372dc0c8fd0
SHA512
66573309fe32fd2fec146562d622c02a4cd79046bc0d37a8a14bcd2837b14933374e9278ca0a2223810f1eb0c6aad33bc5ecc784a291753d4eb0b623477e2e1b
SSDEEP
768:Xjo6OIo+qW/YTHlxSEgTmpoTvB3pDSDj1W6eWcTkbCvl0PRip2GdK:bO3+sF/gTmwZDaW4Nel0Ip2C
Checks for missing Authenticode signature.
resource |
---|
67ce69b7d8a3e93a8cb169b3ddac0d53 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
IsBadReadPtr
GetModuleHandleA
GetProcAddress
WriteProcessMemory
OpenProcess
VirtualAllocEx
FreeEnvironmentStringsW
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
VirtualFreeEx
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
RegCloseKey
RegQueryValueExA
LsaOpenPolicy
LsaQueryInformationPolicy
RegEnumKeyW
LsaFreeMemory
RegOpenKeyExA
RegEnumKeyA
LsaClose
PWDump
SecDump
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ