@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
2e42dbe551bff292e4164e452022bbbd371c71de9fe1364157d162375c604980.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2e42dbe551bff292e4164e452022bbbd371c71de9fe1364157d162375c604980.exe
Resource
win10v2004-20240226-en
Target
2e42dbe551bff292e4164e452022bbbd371c71de9fe1364157d162375c604980
Size
228KB
MD5
401311a43c0e7660214ea9b434d00500
SHA1
eb0a87e54c447eb4eec00caaa74aad209bed4880
SHA256
2e42dbe551bff292e4164e452022bbbd371c71de9fe1364157d162375c604980
SHA512
977154886edaf0cfb5562e4ef482365f0cea3cb2674127d25ce7ca09f255bb86d2eb96392a7ac628fd7dc0fee9cda4c0e99917927842c2e9e1a9154026071ee0
SSDEEP
6144:dlyijC9SDKnBZEZZPEfQsSlNley50yknDEmgBJocoVnX+3VUbXN0qQwV:dlyivDKnDQsSlNley50yknDEmgBJofXn
Checks for missing Authenticode signature.
resource |
---|
2e42dbe551bff292e4164e452022bbbd371c71de9fe1364157d162375c604980 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
CreatePen
CreateSolidBrush
DeleteObject
GetStockObject
LineTo
MoveToEx
SelectObject
SetBkMode
SetTextColor
TextOutA
CheckMenuItem
CreateWindowExA
DefWindowProcA
DispatchMessageA
EnableMenuItem
EnumThreadWindows
ExitWindowsEx
FillRect
GetClientRect
GetDC
GetMenu
GetMessageA
InvalidateRect
KillTimer
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
RegisterClassA
ReleaseDC
SendMessageA
SetClassLongA
SetTimer
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ