fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
7c1bd9e498e0b4b9a596992523bb2d95.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c1bd9e498e0b4b9a596992523bb2d95.dll
Resource
win10v2004-20231215-en
Target
7c1bd9e498e0b4b9a596992523bb2d95
Size
7KB
MD5
7c1bd9e498e0b4b9a596992523bb2d95
SHA1
50554169be6aad717dc75529e1aeb14acb86f851
SHA256
d53c1befa718cb1818fac9756b9fddab267c8b46d8ae30d3ea266ffccf67ee10
SHA512
8296c3f9ff71eaa4089e910b0a538f820bc8040068df970ac46b15d12b864ca6b8229030a553cc5517671af3c3a373b7bd8fdeb46ccc7321ed83811e4f4fe467
SSDEEP
96:VMSlbcjxipiypRgHMzaC4dS2li+yLVJOJmqkwgBE6:zcQpiQsPiDVgJmq0x
Checks for missing Authenticode signature.
resource |
---|
7c1bd9e498e0b4b9a596992523bb2d95 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Sleep
GetCurrentProcess
ExitProcess
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcat
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ