Dbjkxfet
Gevwmcvr@4
Gtnlfj@4
Hxkaxado@0
Ioekqlwr@0
Rmewc
Rpxatzud
Vokyeft@0
Wsbkbvx@4
Xszxwkz
Static task
static1
Behavioral task
behavioral1
Sample
ebf10222bdd19bd8f14b7e94694c1534d4fe1d1047034aee7ffe9492cad4a92f.dll
Resource
win10v2004-20231215-en
Target
14568482619.zip
Size
1.6MB
MD5
2a3bc1b6008542b052f44855844cddf8
SHA1
b2df8bb4a800cf488d10415c76790eff5ce72fb6
SHA256
e720b3b80d62671ad254ae282434a617c9a023f20c19ef3ebdeca59cf062e5cf
SHA512
69ee2a5da42cff130b0cfe87b0475666ff9459a9613664220dc1a41a8689bccf3a2e65c6dc45ffbf6939d29d89bce4d299c212383e8e9c7a30dcc264b68a4921
SSDEEP
49152:wvG6dRFUdAf44a+SQvIlYFfpbiAXg/PL3Hm:6jHAAf4hFQvIlqfBVQ3L2
Checks for missing Authenticode signature.
resource |
---|
unpack001/ebf10222bdd19bd8f14b7e94694c1534d4fe1d1047034aee7ffe9492cad4a92f |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetCurrentHwProfileA
GetUserNameW
RegCloseKey
RegOpenKeyExW
StackWalk64
SymCleanup
SymFromAddr
SymFunctionTableAccess64
SymGetModuleBase64
SymInitialize
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateFileW
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
FlushFileBuffers
FreeLibrary
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetHandleInformation
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetProductInfo
GetSystemDefaultLangID
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetThreadPriority
GetTickCount64
GetVersionExW
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
OpenProcess
OpenThread
OutputDebugStringA
RaiseException
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
RtlCaptureContext
RtlCaptureStackBackTrace
SetEvent
SetFilePointer
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
Sleep
SuspendThread
Thread32First
Thread32Next
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
__mb_cur_max
_amsg_exit
_beginthreadex
_endthreadex
_errno
_initterm
_iob
_lock
_setjmp3
_strdup
_ultoa
_unlock
_vsnprintf
_vsnwprintf
abort
atoi
calloc
exit
fgetwc
fprintf
fputc
fputs
free
fwrite
getc
localeconv
longjmp
malloc
memcpy
memmove
memset
printf
realloc
setlocale
strchr
strcmp
strerror
strlen
strncmp
vfprintf
wcslen
SafeArrayCreate
SafeArrayDestroy
SafeArrayLock
SafeArrayUnlock
SysAllocString
SysFreeString
VariantInit
PathCombineW
CharLowerBuffW
GetIconInfo
HttpOpenRequestW
HttpSendRequestW
InternetConnectW
InternetOpenW
InternetQueryOptionW
InternetSetOptionW
Dbjkxfet
Gevwmcvr@4
Gtnlfj@4
Hxkaxado@0
Ioekqlwr@0
Rmewc
Rpxatzud
Vokyeft@0
Wsbkbvx@4
Xszxwkz
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ