lll
mmm
Static task
static1
Behavioral task
behavioral1
Sample
79c6b0379550f56881391f33af5dbe75.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79c6b0379550f56881391f33af5dbe75.dll
Resource
win10v2004-20231215-en
Target
79c6b0379550f56881391f33af5dbe75
Size
31KB
MD5
79c6b0379550f56881391f33af5dbe75
SHA1
5bd615359ceaa3177fc9f602f1d87a4723e12ebb
SHA256
4c67dfc290c5cddcd54e8a43790f82e19db2fdf4480ca6170ee19383c0565e6c
SHA512
e6d925864477c67b24a09a1b8b2e2bbfa297a269258f6d77c27840eeeedded4ae8dcb1a046220e2894dc3841ee206fd87a9440ccd62481cd74949a90270e2e67
SSDEEP
384:PZfBuOCXr2dE3fQDBDnYp94fa/G5qBn9Wc2F8eDgpnee8sW+Du4gJHGG5:N8Xyd5DFkj/vn9ns8ekpqbmq95
Checks for missing Authenticode signature.
resource |
---|
79c6b0379550f56881391f33af5dbe75 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
GlobalAlloc
GetModuleHandleA
WritePrivateProfileStringA
CreateThread
SetEvent
WriteFile
TerminateThread
IsBadReadPtr
VirtualFree
GetPrivateProfileStringA
GetCommandLineA
CreateMutexA
GetCurrentProcessId
GetTickCount
VirtualFreeEx
lstrlenA
VirtualAllocEx
GetCurrentProcess
GetModuleFileNameA
ReadProcessMemory
SetUnhandledExceptionFilter
GlobalUnlock
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
ExitProcess
GetSystemDirectoryA
GetCurrentThreadId
DisableThreadLibraryCalls
SetFilePointer
VirtualProtectEx
GlobalFree
VirtualAlloc
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
GetTempPathA
lstrcatA
LoadLibraryA
SetThreadContext
GetProcAddress
GetWindowThreadProcessId
UnhookWindowsHookEx
CallNextHookEx
GetWindowTextA
GetForegroundWindow
SetWindowsHookExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
srand
_strcmpi
_strlwr
_stricmp
strcmp
fopen
fread
fclose
sprintf
strcat
strlen
strcpy
strstr
memset
??2@YAPAXI@Z
memcpy
strrchr
rand
atoi
??3@YAXPAX@Z
strncpy
strchr
lll
mmm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ