nnn
ooo
Static task
static1
Behavioral task
behavioral1
Sample
a173de36f5eaa4342cfbd9e7ff80da9c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a173de36f5eaa4342cfbd9e7ff80da9c.dll
Resource
win10v2004-20240221-en
Target
a173de36f5eaa4342cfbd9e7ff80da9c
Size
29KB
MD5
a173de36f5eaa4342cfbd9e7ff80da9c
SHA1
c015d340a25f07ed70f229ec216f0231023934a0
SHA256
788c5a45a7b145eadead594498a5d733565c8715172c4219fb8e9e943f7123e2
SHA512
45bf16df81e378768b2d082ec6397e7562bb4f051c2487bdfa51520fdf1275589111afa2be8619bfe4d27c7b08a29593920ab9f6a2f33d1687d1b22f537684a4
SSDEEP
768:ldgcXjZdHc4wUNsEHld0+qgDG5Fq3BwRlE:ldg0c4Fd0+HGw
Checks for missing Authenticode signature.
resource |
---|
a173de36f5eaa4342cfbd9e7ff80da9c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualProtect
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
GetTickCount
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
GetCurrentProcessId
CreateMutexA
GetLastError
ExitProcess
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
OpenThread
CreateThread
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
strchr
fclose
fread
fopen
_stricmp
_strupr
_strcmpi
_strlwr
strncpy
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
wcslen
strstr
atoi
??3@YAXPAX@Z
nnn
ooo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ