fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
bbb6fb8e05e360cd737eea32dfb5f668.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbb6fb8e05e360cd737eea32dfb5f668.dll
Resource
win10v2004-20240226-en
Target
bbb6fb8e05e360cd737eea32dfb5f668
Size
11KB
MD5
bbb6fb8e05e360cd737eea32dfb5f668
SHA1
446bcff7932e0c9a76c6cc0dedca1f94d229889e
SHA256
e8010ca20dca29f54902c450eb026455e3a1e96c5055ced47810e1cf83a1e1d4
SHA512
79a79379224507af6de764b02b9558233b6cfcfdacae84a50e280f58847bdb8cb9b25fd13cbe1a5701bb9bedcb1d36225781a10137b70e724f6f4e338c72fbbb
SSDEEP
192:EMFj21jA8v5UAZK2Ywl/bpfKGjNcG3o7:J6hA8v5UAZKUlD1jqG3
Checks for missing Authenticode signature.
resource |
---|
bbb6fb8e05e360cd737eea32dfb5f668 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
_adjust_fdiv
malloc
_stricmp
_initterm
free
strcat
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
strcmp
CallNextHookEx
SetWindowsHookExA
MultiByteToWideChar
Sleep
VirtualProtectEx
GlobalFree
ReadProcessMemory
WideCharToMultiByte
GlobalAlloc
IsBadReadPtr
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
CreateThread
GetModuleFileNameA
GlobalLock
GetCurrentProcess
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ