ooo
ppp
uiopwdc
Static task
static1
Behavioral task
behavioral1
Sample
744000e0a4ebd0f1cc79b34525c1c953.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
744000e0a4ebd0f1cc79b34525c1c953.dll
Resource
win10v2004-20231215-en
Target
744000e0a4ebd0f1cc79b34525c1c953
Size
40KB
MD5
744000e0a4ebd0f1cc79b34525c1c953
SHA1
ae50d4f9775f87d248540ff4707ff180f6c86dbe
SHA256
b8d62c580ed10452b953289ed63c1aa9e6efd394fbf02feedb1db8fccff57dfb
SHA512
a00852b8ba58d65e1adf3776f416eff04e0270e90832fd87a9650732d9ac87ace5ea150fd1a494bd166a13baa8581ca64993fd383ae3f1b425f312935c644ccc
SSDEEP
768:jst0o8O14hL/j2BnDvNm6iS5Ks+G0NSguU+:jem+V7d3H1
Checks for missing Authenticode signature.
resource |
---|
744000e0a4ebd0f1cc79b34525c1c953 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
RaiseException
GetLocalTime
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
GetTickCount
ExitProcess
GetLastError
WideCharToMultiByte
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
VirtualProtectEx
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
RegOpenKeyExA
RegCloseKey
_strcmpi
_stricmp
_strlwr
_strupr
__CxxFrameHandler
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
strstr
??3@YAXPAX@Z
strncpy
strchr
ooo
ppp
uiopwdc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ