Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
6844ac53b40038d9d6d0ea14780ea5d2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6844ac53b40038d9d6d0ea14780ea5d2.dll
Resource
win10v2004-20231215-en
Target
6844ac53b40038d9d6d0ea14780ea5d2
Size
116KB
MD5
6844ac53b40038d9d6d0ea14780ea5d2
SHA1
f3bdcc099d52d825a11267ea93874d8d65afb8b8
SHA256
b938226a35e6fca42539b973fadf6411965e7a75b796f3b34da3eeefa61ddd30
SHA512
ac5f601068353ad75c42f4dde35ae740e3b9b23fae912cbbc61e2a82a60ad36ff78902f79ba5b30178eac6e7c8539e847ec907a6a6caa2f522567abd3726c13d
SSDEEP
3072:8jrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:D5ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
6844ac53b40038d9d6d0ea14780ea5d2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ