ppp
qqq
Static task
static1
Behavioral task
behavioral1
Sample
cd0a8b8692d17a890a04fbc9c914b184.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cd0a8b8692d17a890a04fbc9c914b184.dll
Resource
win10v2004-20240226-en
Target
cd0a8b8692d17a890a04fbc9c914b184
Size
24KB
MD5
cd0a8b8692d17a890a04fbc9c914b184
SHA1
1c515487650f08a3bdfccf86349d60c85298a5dd
SHA256
97362ead34d2e5f40cedd2e9dcacc1d150ff673c7fafd9a5a104669ed33dc1dd
SHA512
afa5c6f3cbb1a537f8f3b01b33c5886a40b79b032b4d1d5ed9cb828b7b1813d994ceed0a55b9204474f42ff897916a4a0287a54014af109112d54ace896b8c5e
SSDEEP
384:aRXKHscyvDtUmdlnhEXshuSuPcouIABsBfBXygbDtqAXfwZW3fGDO+gJ:o6fmvhuSuPcouLBsBZXlbDtpoc3uDO1
Checks for missing Authenticode signature.
resource |
---|
cd0a8b8692d17a890a04fbc9c914b184 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
SetFilePointer
GetCurrentProcessId
VirtualProtectEx
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WriteProcessMemory
CreateMutexA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
UnhookWindowsHookEx
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
GetForegroundWindow
InternetCloseHandle
InternetReadFile
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
strcat
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
ppp
qqq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ