@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
DESK32.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
DESK32.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
WALL32EN.rtf
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
WALL32EN.rtf
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
WALL32TR.rtf
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
WALL32TR.rtf
Resource
win10v2004-20231215-en
Target
8b0914cf5abeba40c69dba9107fb9cc6
Size
26KB
MD5
8b0914cf5abeba40c69dba9107fb9cc6
SHA1
93b6db994fc5108e605562ed8e1cc38989009676
SHA256
4a5ddf813ab930136d8ed97b2fa3f44510d819143ed470619b7fb5ed6f612cba
SHA512
074fffe66e18c25a06e46f3d7375545c132b23766aeca90895393b4402ed247e4b2a46ba7aac08fcfc49a30ecfc01657623cf5fe3a859ad823dde4bf8af491b5
SSDEEP
768:y7KxMSZLXI6fxHj8AOAkSCuk0aAyE5VQh:yG7ZDVH79ktukQNQh
Checks for missing Authenticode signature.
resource |
---|
unpack001/DESK32.EXE |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetProcAddress
GetModuleHandleA
LoadLibraryA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE