aab
aal
allert2
fgllert
qoad
windows
Static task
static1
Behavioral task
behavioral1
Sample
Hoax.Win32.Agent.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Hoax.Win32.Agent.dll
Resource
win10v2004-20240226-en
Target
c81c2678935716b9238f4aa4969041b2
Size
6KB
MD5
c81c2678935716b9238f4aa4969041b2
SHA1
c6f42effc0348d93b10bf4cdc01d3229efc23294
SHA256
52a9de95fe21345c4341c80603eff8ee45c1c830d6518a584fd30ae130293375
SHA512
99210a8e648bae7c4836720172373a25513f50c057e4a17ec9cacc1c21c26a3d78375a7c10861cde5fe636eed2cd25741c8ce9ebee1eb6bf4e57e0f3a0a83f21
SSDEEP
96:y96yiPO3aKnYXSJOCFF1k+NDepKbol8bYLSyVAb63vYONQEcjSsCyOF5uMb9n:yst23Rq6L1k4Deppz/mSZ5uMbB
Checks for missing Authenticode signature.
resource |
---|
unpack001/Hoax.Win32.Agent.di |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PostQuitMessage
RegisterClassExA
LoadIconA
SetWindowPos
SetWindowTextA
TranslateAcceleratorA
TranslateMessage
LoadCursorA
SetTimer
LoadAcceleratorsA
KillTimer
GetMessageA
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
lstrcpynA
WritePrivateProfileStructA
WaitForSingleObject
TerminateProcess
RtlZeroMemory
LoadLibraryA
GetVersionExA
GetTempPathA
GetTempFileNameA
GetProcAddress
ClearCommError
CloseHandle
CopyFileExA
CopyFileExW
CreateThread
DefineDosDeviceA
DeleteFileA
GetLastError
GetLongPathNameA
GetModuleFileNameA
GetModuleFileNameW
fread
strlen
strcpy
strcat
fwrite
fseek
fopen
fclose
atoi
_wfopen
_strlwr
PathFileExistsA
StrStrA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyA
RegCloseKey
aab
aal
allert2
fgllert
qoad
windows
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ