fx
kkk
Static task
static1
Behavioral task
behavioral1
Sample
705145dd649e3c98f36ad5499522406f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
705145dd649e3c98f36ad5499522406f.dll
Resource
win10v2004-20231215-en
Target
705145dd649e3c98f36ad5499522406f
Size
27KB
MD5
705145dd649e3c98f36ad5499522406f
SHA1
673f60eaf9405dffc11cc353c57ca64d8f26a68c
SHA256
f2fba39b2e415a396e963688c48d529458acf889fcb34f81f62132cbbe701e83
SHA512
4c6bdaaeaf27ff43ce0ba7335f6b17743a34a36a4d9dc00590c95c38500fe98eead0cfb54460b2a1559af3021ea9fdbdd459cb95dd5928f07005ff7a7c19b42f
SSDEEP
384:qCElEmllEmzTRDvA//PgdztRACGgOqBFDis5npxTlGWb5AfH5G8CyNToqhpR0M:SEEEGlDv0/+D/GgN5GWWh5NToCJ
Checks for missing Authenticode signature.
resource |
---|
705145dd649e3c98f36ad5499522406f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
GetCurrentThreadId
GetCurrentProcess
GetCommandLineA
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Thread32Next
GetThreadPriority
Thread32First
CreateToolhelp32Snapshot
IsBadReadPtr
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetPrivateProfileStringA
TerminateThread
CreateThread
Sleep
GetModuleHandleA
GetProcAddress
WriteFile
GetWindowThreadProcessId
GetWindowTextA
CallNextHookEx
_stricmp
_strlwr
_strcmpi
_strupr
sprintf
strlen
memcpy
strcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
wcslen
fx
kkk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ