__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
8bb1cd843dd16c02e97ab43440e30278.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bb1cd843dd16c02e97ab43440e30278.exe
Resource
win10v2004-20231215-en
Target
8bb1cd843dd16c02e97ab43440e30278
Size
199KB
MD5
8bb1cd843dd16c02e97ab43440e30278
SHA1
934c419edd4938a173d78f9a536277b5db678872
SHA256
e5b510c0f6542253f0abd00f0776021487181274cf869cca3717cad23d871d79
SHA512
aaa747a8765247166f333526574ffb06dfa600a9337aceb15067e543778c7b6923bbc911ac70838b862e62536f0e919b5851ec1d1333e479d7615104f4a30a1c
SSDEEP
3072:7HH/El8aVZw3xiBvybyKL28+A6Jfl88pI8VDI+FvKMbMo1Vump:DEl8eZwaq+KyBJdLp1r4o1Vum
Checks for missing Authenticode signature.
resource |
---|
8bb1cd843dd16c02e97ab43440e30278 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
_memset
_malloc
_strcat
__ExceptionHandler
_abort
_strstr
_strlen
_strncpy
@_CatchCleanup$qv
_memcpy
__startup
_strncmp
_atol
@__unlockDebuggerData$qv
_strcmp
_flushall
_memcmp
@__lockDebuggerData$qv
___debuggerDisableTerminateCallback
_strcpy
__ftol
_free
GetSystemDirectoryA
CompareFileTime
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetSystemDefaultLangID
CopyFileA
GetVersionExA
GetModuleFileNameA
GetLocalTime
GetFileTime
GetFileAttributesA
FreeLibrary
GetCurrentProcess
DeleteFileA
CreateProcessA
WriteFile
UnmapViewOfFile
CreateFileMappingA
ReadFile
MapViewOfFile
CreateFileA
LoadLibraryA
CloseHandle
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegDeleteKeyA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
RegEnumKeyA
SelectObject
GetTextExtentPointA
GetStockObject
DeleteObject
DeleteDC
CreateFontA
CreateCompatibleDC
BitBlt
BeginPaint
AppendMenuA
wsprintfA
UpdateWindow
ShowWindow
SetTimer
SetDlgItemTextA
SendDlgItemMessageA
ReleaseDC
RegisterClassA
ModifyMenuA
MessageBoxA
MessageBeep
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
GetMessageA
GetMenu
PostQuitMessage
GetDlgItemTextA
GetDC
GetClientRect
SendMessageA
FindWindowA
ExitWindowsEx
EndPaint
TranslateMessage
EndDialog
EnableMenuItem
DispatchMessageA
DialogBoxParamA
DeleteMenu
DefWindowProcA
CreateWindowExA
CheckMenuItem
Netbios
Shell_NotifyIconA
socket
sendto
recvfrom
inet_ntoa
inet_addr
htons
gethostname
gethostbyname
closesocket
bind
WSAStartup
WSACleanup
WSAAsyncSelect
InitCommonControls
CreateStatusWindowA
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE