x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
7cb22c717e8aec5c49810580ac93fe3e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cb22c717e8aec5c49810580ac93fe3e.dll
Resource
win10v2004-20231222-en
Target
7cb22c717e8aec5c49810580ac93fe3e
Size
27KB
MD5
7cb22c717e8aec5c49810580ac93fe3e
SHA1
98fbbff710e58d47f93fa4033c8602da3d9a23c8
SHA256
3f1cee2fffa2dce8028f23eeb15f361a7d7a38f576c86df520390e168f77b578
SHA512
65f8b2902e97306f6f3eab953eea56ca0cf1646020d1c3019b9ce6d4775b9d73fcc8c8445346f4933c259047129c72f860ca6fb06864c18c9268dca54d08bca4
SSDEEP
768:SFKsyEuIegNi1PfRyz5PC7LvMgCJMi9IkN:SFKUegAZfRyz5PZJXa
Checks for missing Authenticode signature.
resource |
---|
7cb22c717e8aec5c49810580ac93fe3e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
lstrcatA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
HeapReAlloc
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
HeapFree
GetProcessHeap
HeapAlloc
GetFileAttributesW
WinExec
SetFileAttributesW
SetFileAttributesA
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
GlobalAlloc
lstrcpynA
lstrcpyA
CreateEventA
GlobalFree
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
RegisterWindowMessageA
CharLowerBuffA
ShowWindow
GetClientRect
GetWindowRect
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetSetFilePointer
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetReadFile
InternetCloseHandle
InternetOpenA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ