ddd
fxxdc
Static task
static1
Behavioral task
behavioral1
Sample
7cff222061673455b044c0b3a769839c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cff222061673455b044c0b3a769839c.dll
Resource
win10v2004-20231215-en
Target
7cff222061673455b044c0b3a769839c
Size
24KB
MD5
7cff222061673455b044c0b3a769839c
SHA1
954a4a66efd017f8563aceb18070ab9fdb339f30
SHA256
e599461137e91bef15b1d9678f2bcc8c708bfe5790774c014cae962bbf9c1540
SHA512
b63ed2f3d9723fb589fdaa25f842e66f37b04fa358101fbe85b7a629b697dfc73fda0eabe6fd5e59219fd7edd3b2cfd32513cde230c73b1ed4aa6f9f3689354d
SSDEEP
384:5tveaD/UY2HDCbK/TjX/nifOIxdCxGDtoJa0HmYFdLHbOtbvl8IyaF6W0bSoLCBB:jveaYHDWK/fPYrCsDFdYFd3cLZ8SAmkg
Checks for missing Authenticode signature.
resource |
---|
7cff222061673455b044c0b3a769839c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentThreadId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
GetForegroundWindow
FindWindowA
wcslen
_stricmp
_strlwr
_strupr
_strcmpi
_strnicmp
strcmp
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
ddd
fxxdc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ