ccc
ddd
Static task
static1
Behavioral task
behavioral1
Sample
c4b237178f1e4da3bbb49b2d54907c15.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4b237178f1e4da3bbb49b2d54907c15.dll
Resource
win10v2004-20240226-en
Target
c4b237178f1e4da3bbb49b2d54907c15
Size
30KB
MD5
c4b237178f1e4da3bbb49b2d54907c15
SHA1
1b7c0ecfb1e293bd9af46b4ccdc87f5801edd933
SHA256
2467110e49063ccb36e065e35652aab00b92380f987638e66cdb61be458e4262
SHA512
543e5a38375877d30c1808fce44bd7c0f0559db134c39fab319ceeccca49a4e4ab4f1c6871b05d363bfd6f6802bfa4eaaa563c07ed68856cde1e4c7a5137b59a
SSDEEP
768:HPbjL1PDKt3WkBIijMrVOjltDakBYgFjx:HPbjLxKNfIiArUjx
Checks for missing Authenticode signature.
resource |
---|
c4b237178f1e4da3bbb49b2d54907c15 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateRemoteThread
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
lstrlenA
GetCurrentProcess
ResumeThread
TerminateProcess
GetModuleFileNameA
VirtualProtectEx
WriteProcessMemory
GetPrivateProfileStringA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
ReadFile
CreateFileA
WideCharToMultiByte
MultiByteToWideChar
CreateProcessA
CloseHandle
LoadLibraryA
ExitProcess
GetSystemDirectoryA
GetCurrentThreadId
GetTickCount
RaiseException
SetFilePointer
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
CreateMutexA
GetLastError
lstrcatA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
VirtualAlloc
CreateThread
CallNextHookEx
UnhookWindowsHookEx
GetWindowThreadProcessId
SetWindowsHookExA
FindWindowA
GetForegroundWindow
GetWindowTextA
PathFileExistsA
rand
srand
wcslen
_stricmp
_strupr
_strlwr
_strcmpi
_ltoa
strcmp
fopen
fread
fclose
strstr
strchr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
atoi
??3@YAXPAX@Z
strncpy
InternetReadFile
InternetCloseHandle
ccc
ddd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ