fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
bb08822771dddee5ec11aa9a6e095c1a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb08822771dddee5ec11aa9a6e095c1a.dll
Resource
win10v2004-20240226-en
Target
bb08822771dddee5ec11aa9a6e095c1a
Size
8KB
MD5
bb08822771dddee5ec11aa9a6e095c1a
SHA1
2cc1c4de2b4f965a60b4cba02e56a78f6659ce8c
SHA256
625ce330babdb1a83e9f8e1646d6f300e6a65877b0d1e3e09e9df83e4ddd2332
SHA512
6bdbc29d15b4a467b8a449068916dd823a3d6f82734426d2266ee02775c751a6483796cf666fd913a87abb5cb33f9c2086047624393a75dcc7288e4c081c54bc
SSDEEP
96:tIlJnRQzLNFjjoykLe5TrAXzgfEy/rPRogU6oEJEafl0sR/c:EJnRQXjjTUzS30mLqsZ
Checks for missing Authenticode signature.
resource |
---|
bb08822771dddee5ec11aa9a6e095c1a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
IsBadReadPtr
GetPrivateProfileStringA
Sleep
ReadProcessMemory
CreateThread
GlobalFree
GlobalLock
GlobalAlloc
GetModuleFileNameA
GetCurrentProcess
WriteProcessMemory
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
sprintf
_adjust_fdiv
malloc
_initterm
free
memset
??3@YAXPAX@Z
strrchr
strcpy
_stricmp
??2@YAPAXI@Z
strlen
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ