fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
caa9d3f65568ea85a21afdbf6ccfce4a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
caa9d3f65568ea85a21afdbf6ccfce4a.dll
Resource
win10v2004-20240226-en
Target
caa9d3f65568ea85a21afdbf6ccfce4a
Size
16KB
MD5
caa9d3f65568ea85a21afdbf6ccfce4a
SHA1
30a04daf5ec8f0be62ee71504ef96ce8089a6a25
SHA256
7230ba89c332b852c504bc4e3d7348c0a36daf8ffb14f973e580fbb48a16d002
SHA512
c4d445fd3444e20ca20c7bb97b4de2a98700eafb7f7007fd23f3517c3a348fc92f3a26ac2447a8b5f0533211f6bc604fe3c42aa9be11e1c67a1c83e26dd119fb
SSDEEP
384:z/3ckfSkHkqckMz7J8JpH3gN9UNms83v+aB8ac2NAlF:z/NSEJqi7w8Nmj3VSac2Sl
Checks for missing Authenticode signature.
resource |
---|
caa9d3f65568ea85a21afdbf6ccfce4a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteProcessMemory
ReadProcessMemory
ExitProcess
GlobalFree
GetComputerNameA
GlobalLock
GlobalAlloc
IsBadReadPtr
CreateThread
GetModuleFileNameA
GetCurrentProcessId
Sleep
GetCurrentProcess
GlobalUnlock
GetWindowThreadProcessId
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
fopen
fread
fclose
strlen
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcpy
strncpy
strchr
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ