Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
c7b0f981eab8e9a41b62e63caa9d8262.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c7b0f981eab8e9a41b62e63caa9d8262.exe
Resource
win10v2004-20240226-en
Target
c7b0f981eab8e9a41b62e63caa9d8262
Size
110KB
MD5
c7b0f981eab8e9a41b62e63caa9d8262
SHA1
89b2fac8722affac6443b92a4d20f01b2aa4db32
SHA256
78664e6521566e19a347afa4a3b86e9113330ab50ee0c7646f6708b1250e88d2
SHA512
ed2b3ed9811f45f10c0ecff93c64783bf14c0f3a15eb6ff50085479a094ca8fbaaf8404169a9371416400ab639b99ca8b5bf4eb1e5290ab04a8bbff5ac6afb11
SSDEEP
3072:mIUXnU97ufgjTgr1778rH+4dkjqpaL2NKsaH/SP:mIoUAIgr1/8rH+4dyeNKf/S
Checks for missing Authenticode signature.
resource |
---|
c7b0f981eab8e9a41b62e63caa9d8262 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ