?lbreyEquG@@YGPAMF@Z
?VxncGNedfV@@YGKE@Z
?YdganKqKDqx@@YGPADHJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
706eb6d2c080ae2d6f125b6d81619e2b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
706eb6d2c080ae2d6f125b6d81619e2b.exe
Resource
win10v2004-20231215-en
Target
706eb6d2c080ae2d6f125b6d81619e2b
Size
110KB
MD5
706eb6d2c080ae2d6f125b6d81619e2b
SHA1
daeb74679c914646b0d03d53e8536d5ba04a5144
SHA256
6ff364097c29dd9f7bb1d9f8813adecd48674e182fb2cfbd531384f6a02e2ed7
SHA512
1249d7c1a505533520a304669824bf600c81317c3659958d748344029db03907424ef3efbc7c5f7d447b27c7e3b65db0233cb4130f13eae0b021592f7762c06b
SSDEEP
3072:VaYfmOORLrk3iHslm2zHJCQp7TaIC/onuW:Qgmq3GslmUHJrTal/o
Checks for missing Authenticode signature.
resource |
---|
706eb6d2c080ae2d6f125b6d81619e2b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryW
CreateThread
GlobalFlags
GetTempFileNameW
GetProcAddress
OpenFile
GetBinaryTypeA
DuplicateHandle
DisconnectNamedPipe
lstrcmpiW
GetFileInformationByHandle
CreateMailslotW
IsBadCodePtr
GetNearestPaletteIndex
GetTextMetricsA
ExtFloodFill
GetStockObject
CreateDiscardableBitmap
RealizePalette
PtInRegion
Polygon
Rectangle
SetMenu
DestroyAcceleratorTable
AllowSetForegroundWindow
CharUpperBuffA
ShowScrollBar
TrackPopupMenuEx
RedrawWindow
GetPropW
GetKeyboardLayout
GetMenuItemID
CharUpperBuffW
GetWindowLongW
EqualRect
?lbreyEquG@@YGPAMF@Z
?VxncGNedfV@@YGKE@Z
?YdganKqKDqx@@YGPADHJ@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ