lll
mmm
Static task
static1
Behavioral task
behavioral1
Sample
97401468daacfa47603d16b9e454f46a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97401468daacfa47603d16b9e454f46a.dll
Resource
win10v2004-20231222-en
Target
97401468daacfa47603d16b9e454f46a
Size
29KB
MD5
97401468daacfa47603d16b9e454f46a
SHA1
a9b620fe8fcfddd481eb8c79ed55c71609c05ed1
SHA256
52c5d6643a5207fc958a6f8f13dd49e021396ff9cd5ebb8b15c820a4a5dff39c
SHA512
b41c914fb3b3aca92379c14edd4a87692d76ed79b3910129dd0418c6fceca0788b41bb388b2ae3800bccb5958bdc89be6eabe132baaed42ccd8ad060e09c73e9
SSDEEP
384:yBU9iKyggrUn5DAU8t6PPH/1P476hlHY/d3bJEs82JUdvGIuI7SrjWy:cUMKyDYD3PH/94oipltS4IhuWy
Checks for missing Authenticode signature.
resource |
---|
97401468daacfa47603d16b9e454f46a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WritePrivateProfileStringA
CreateThread
SetEvent
WriteFile
TerminateThread
IsBadReadPtr
VirtualFree
GetPrivateProfileStringA
GetCommandLineA
CreateMutexA
GetCurrentProcessId
GetTickCount
VirtualFreeEx
lstrlenA
VirtualAllocEx
GetCurrentProcess
GetModuleFileNameA
ReadProcessMemory
VirtualAlloc
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
ExitProcess
GetCurrentThreadId
DisableThreadLibraryCalls
VirtualProtectEx
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
GetTempPathA
lstrcatA
GetModuleHandleA
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
GetWindowThreadProcessId
CallNextHookEx
GetWindowTextA
SetWindowsHookExA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
_strcmpi
_strlwr
_stricmp
sprintf
strcat
strlen
strcpy
strstr
memset
??2@YAPAXI@Z
memcpy
strrchr
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strcmp
__CxxFrameHandler
lll
mmm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ