GetCurrentThread
GetProcessHeap
HeapAlloc
HeapFree
ReadProcessMemory
VirtualAllocEx
VirtualFreeEx
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WriteProcessMemory
Static task
static1
Behavioral task
behavioral1
Sample
loader_3.exe
Resource
win10v2004-20231215-en
Target
loader_3.exe
Size
12.3MB
MD5
8a3fb4238e9c4873df1c159e8981884a
SHA1
7d0473db7f816b7a1f102bae67dc15fdbdd311ac
SHA256
2fef05815b1310e2c9d072119df93b9a73eb59cd56d0d5c0613046f7b84e1f13
SHA512
0a2174c6edbd52c970a5b41b563610cbff0692d11051776ed5e00416cd35fcf11197f1e9e346de56ec2b8489263025c40c3498892a58941ce89f2ed05701b549
SSDEEP
196608:HoA71uKRK3m7sGPfWqwUodOzeYWnGjIdwTwscQzcIhyOHaitXwmBQZE1yFBbK:Hb71uKRKZGPf9Y4IGjpYwcIhyqX6W
Checks for missing Authenticode signature.
resource |
---|
loader_3.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VirtualProtect
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
ioctlsocket
__current_exception_context
__CxxFrameHandler4
_crt_atexit
fclose
remove
realloc
strtoull
tolower
ceilf
srand
_time64
___lc_codepage_func
GetCurrentThread
GetProcessHeap
HeapAlloc
HeapFree
ReadProcessMemory
VirtualAllocEx
VirtualFreeEx
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WriteProcessMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ