_mJuXJRDokSp@20
_hTpb5Bg6X9@20
rTG8AZIp2Ikr
Static task
static1
Behavioral task
behavioral1
Sample
8f28d13c3ef806664ca602589226daa5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f28d13c3ef806664ca602589226daa5.exe
Resource
win10v2004-20231215-en
Target
8f28d13c3ef806664ca602589226daa5
Size
150KB
MD5
8f28d13c3ef806664ca602589226daa5
SHA1
6728f615477b8266ab952c75efd22c2cee3f6c0e
SHA256
b0ec1c7d122a89d3a63908a592b62526f4fcf93672b57550ace10bdd0ac870fe
SHA512
be5d4a2b32d93af5a791a8bb5dad555bdadd9c60a43bb69d45982182521a0053b80f8b4f6f18aae95758edf40a73b777eda3a18451587c3cd405ab2ad89119e0
SSDEEP
3072:79ELyQJ20T0hGgd5xD3Ls2kdMdV6LA4Rx6fBApS57i1ap/:79MJLTQD7sfdMdQA4R+Af1
Checks for missing Authenticode signature.
resource |
---|
8f28d13c3ef806664ca602589226daa5 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathA
SHGetDesktopFolder
SHGetFileInfoA
SHFileOperationA
SHGetSpecialFolderLocation
GetUserNameA
TrackPopupMenu
ShowWindow
SystemParametersInfoA
CharNextA
GetSysColorBrush
TranslateMDISysAccel
CreateMenu
GetMenu
TranslateMessage
UnhookWindowsHookEx
IsChild
GetDiskFreeSpaceA
VirtualQuery
GetLastError
InitializeCriticalSection
GetCommandLineW
LoadLibraryExA
HeapAlloc
VirtualAllocEx
CloseHandle
LockResource
SetHandleCount
GetStringTypeA
GetCurrentProcessId
ExitProcess
LoadLibraryA
GlobalAlloc
GetModuleHandleW
ReadFile
ExitThread
WriteFile
GetCommandLineA
GetDateFormatA
LocalReAlloc
GetVersion
FindResourceA
_mJuXJRDokSp@20
_hTpb5Bg6X9@20
rTG8AZIp2Ikr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ