jjj
kkk
Static task
static1
Behavioral task
behavioral1
Sample
c6d7785fa2bb4409cf2ff89c054fd06a.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c6d7785fa2bb4409cf2ff89c054fd06a.dll
Resource
win10v2004-20240226-en
Target
c6d7785fa2bb4409cf2ff89c054fd06a
Size
28KB
MD5
c6d7785fa2bb4409cf2ff89c054fd06a
SHA1
74cccc7abe23b7c76ed09a9ed537d1b8b968d06d
SHA256
9d79253f72aa762f479c72f2d6e58c8ecf587879d11fc2eec2040c513a076a51
SHA512
51ca275381845ff406d8b1512d370f185ee68e35d317cc7e9879ed8734520496c364eb97601d270c1eb47c304ad6073bce41c8133fdd671a0903ecc1fb75ff8f
SSDEEP
768:u7ECqVdKDcsG/szpVxwaiI+21ZRzfaMpZ:u7ECqLMccvxj+yOkZ
Checks for missing Authenticode signature.
resource |
---|
c6d7785fa2bb4409cf2ff89c054fd06a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
GetCurrentThreadId
GetCurrentProcess
GetSystemDirectoryA
ReadFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Thread32Next
GetThreadPriority
Thread32First
CreateToolhelp32Snapshot
WriteProcessMemory
CloseHandle
GetCommandLineA
IsBadReadPtr
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetPrivateProfileStringA
TerminateThread
CreateThread
Sleep
WriteFile
GetWindowThreadProcessId
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetForegroundWindow
InternetCloseHandle
InternetReadFile
strcmp
wcslen
_stricmp
_strlwr
_strupr
_strcmpi
fopen
fread
fclose
strstr
sprintf
strlen
memcpy
strcpy
??2@YAPAXI@Z
strrchr
memset
strcat
atoi
??3@YAXPAX@Z
strncpy
strchr
jjj
kkk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ