InsertA
InsertB
InsertC
InsertD
InsertE
Behavioral task
behavioral1
Sample
c246f818f25139dc88fe3f0f3dd66876c8525de9f4a54c316c1bbeb393dd795e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c246f818f25139dc88fe3f0f3dd66876c8525de9f4a54c316c1bbeb393dd795e.dll
Resource
win10v2004-20240226-en
Target
c246f818f25139dc88fe3f0f3dd66876c8525de9f4a54c316c1bbeb393dd795e
Size
3.1MB
MD5
32aaaa241f12c22900092243ca57b2cc
SHA1
907e7bec126ac14a34efecac037879a891e3223b
SHA256
c246f818f25139dc88fe3f0f3dd66876c8525de9f4a54c316c1bbeb393dd795e
SHA512
4b5a22689d4adc3710c7c71789b6cb9010e129566d4c6d41206fb2c2ce80f35d998ee5f82c9fc8c0c86d89fcf1bb18b136d45b39c4f8766a193962d62e12d9d0
SSDEEP
98304:nLoiqmu+PBlX9XhtXTTkT5LKZ7SDMizdS:dP/5DwT1KZOIEw
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
c246f818f25139dc88fe3f0f3dd66876c8525de9f4a54c316c1bbeb393dd795e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteProcessMemory
WriteFile
lstrlenA
GetModuleFileNameA
GetSystemInfo
FindClose
FindFirstFileA
lstrcpyA
LoadLibraryExA
lstrcpynA
GetSystemTime
GetLocalTime
ReadFile
SetFilePointer
GetFileSize
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
WaitForSingleObject
CreateProcessA
GetTempPathA
GetSystemDirectoryA
LocalFree
GlobalUnlock
LocalLock
GlobalAlloc
DeviceIoControl
ReleaseSemaphore
CreateSemaphoreA
GetPrivateProfileStringA
IsBadReadPtr
GetCurrentProcess
VirtualProtectEx
VirtualAlloc
VirtualFree
GetVersionExA
lstrcatA
FreeLibrary
GetCurrentProcessId
OpenProcess
TerminateProcess
LoadLibraryA
CreateFileA
GetLastError
GetProcAddress
GetModuleHandleA
GetTickCount
CloseHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetStdHandle
GetFileType
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
SetCursor
GetDesktopWindow
wsprintfA
LoadCursorA
MessageBoxW
RegOpenKeyExA
ReportEventA
DeregisterEventSource
RegEnumKeyExA
RegCloseKey
RegisterEventSourceA
Netbios
_strnicmp
free
malloc
_except_handler3
atol
fclose
fread
fopen
_ltoa
_stricmp
_pctype
__mb_cur_max
_isctype
realloc
memchr
fwrite
fflush
_setmode
ftell
fseek
fgets
abort
wcsstr
_vsnprintf
vfprintf
_iob
strcmp
qsort
fprintf
_initterm
_adjust_fdiv
mktime
localtime
time
srand
__CxxFrameHandler
rand
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
_fileno
memmove
InsertA
InsertB
InsertC
InsertD
InsertE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ