?mpiJoxysAkkfzto@@YGPAHPAHM@Z
?hgzgqfEWyCkJDTqnhqkf@@YGFFM@Z
?hgrJtyiugk@@YGJDPAN@Z
?vejfsibXJWbnrw@@YGDKI@Z
?aqhieXege@@YGMJM@Z
Static task
static1
Behavioral task
behavioral1
Sample
7697773c0298ab11d11cd8585e98f1dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7697773c0298ab11d11cd8585e98f1dd.exe
Resource
win10v2004-20231215-en
Target
7697773c0298ab11d11cd8585e98f1dd
Size
116KB
MD5
7697773c0298ab11d11cd8585e98f1dd
SHA1
54a09917012956716b1f137cfbedefee912eae3b
SHA256
fe08b47c587bbdc31fbf2c1d845f088b614ecedfbba9ebad653cb58a4128e820
SHA512
bef60de3fa7561b2b882482611a67cfcb688f2f5ff360edad90b8ad96169da86181a5572a5d5074d1a1993a13bfd4c9bff53965b2b7a71411f3aa20b82694d6b
SSDEEP
3072:hdNzk7V1BJ92AzW0wPgIYorbR1obsp74hF:dzkp1BL2AzWFl91ppm
Checks for missing Authenticode signature.
resource |
---|
7697773c0298ab11d11cd8585e98f1dd |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForInputIdle
UnionRect
DragObject
CallWindowProcA
LoadIconW
GetScrollPos
DrawIcon
GetClassInfoExA
GetKeyboardType
InsertMenuW
AppendMenuW
LoadMenuA
GetWindow
DefDlgProcA
SaveDC
CreateDIBSection
SetBitmapDimensionEx
GetPaletteEntries
GetRgnBox
CreatePenIndirect
EndDoc
SetBrushOrgEx
StretchDIBits
GetVersion
IsDBCSLeadByteEx
GetStdHandle
GlobalDeleteAtom
GetFileAttributesExW
lstrlenA
lstrcmpiA
lstrlenW
lstrcatW
GetOEMCP
GetProcAddress
GetModuleHandleW
SearchPathW
_aullrem
ReplaceTextW
FindTextW
GetOpenFileNameW
?mpiJoxysAkkfzto@@YGPAHPAHM@Z
?hgzgqfEWyCkJDTqnhqkf@@YGFFM@Z
?hgrJtyiugk@@YGJDPAN@Z
?vejfsibXJWbnrw@@YGDKI@Z
?aqhieXege@@YGMJM@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ