_soYKv2o
suue5x8GCr4JP
_ucr72tI
Static task
static1
Behavioral task
behavioral1
Sample
8ab6c973bc2753cfc722823f6fc9b9bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ab6c973bc2753cfc722823f6fc9b9bc.exe
Resource
win10v2004-20231222-en
Target
8ab6c973bc2753cfc722823f6fc9b9bc
Size
157KB
MD5
8ab6c973bc2753cfc722823f6fc9b9bc
SHA1
130fa264f682270b53c8e49d10ea84c7d383ee65
SHA256
75c242c688216f9d653a718667adaec3387d5771d4f1c8662cce5543a09fbbe0
SHA512
67446cb0e75ba732e4fcb3863bef0cbf9eb4c648f85dd3164d0fb61b8653ed04882c4dbc753211669b506742331f09534cb3f185684fe2793a1ea8dbc82a04c8
SSDEEP
3072:hHvUBd7vQzU8Km1vdefjm92t1AW58Jre1pgSLpwhbOF7v8qeWa:hPUB1Qz7vimU75COKSLpwhbev83
Checks for missing Authenticode signature.
resource |
---|
8ab6c973bc2753cfc722823f6fc9b9bc |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHQueryInfoKeyA
SHDeleteValueA
SHEnumValueA
PathIsDirectoryA
SHSetValueA
SHGetValueA
GetActiveWindow
FillRect
FrameRect
DrawMenuBar
IsWindow
GetMenu
EnableWindow
FindWindowA
EqualRect
SHFileOperationA
SHGetDesktopFolder
DragQueryFileA
SHGetSpecialFolderLocation
Shell_NotifyIconA
GetCurrentThreadId
CompareStringA
CreateEventA
GetModuleFileNameA
GlobalDeleteAtom
VirtualAllocEx
ResetEvent
VirtualAlloc
FreeLibrary
lstrcatA
FormatMessageA
ExitProcess
LoadLibraryA
WideCharToMultiByte
GetUserDefaultLCID
SetThreadLocale
lstrlenA
GetCommandLineA
DeleteCriticalSection
FindClose
GlobalAddAtomA
FindResourceA
HeapAlloc
_soYKv2o
suue5x8GCr4JP
_ucr72tI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ