faioufoalkdfOn
pfjaoidjglkajd
Static task
static1
Behavioral task
behavioral1
Sample
d5bf73ec157768017d0ec21eaad845bb.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5bf73ec157768017d0ec21eaad845bb.dll
Resource
win10v2004-20231215-en
Target
d5bf73ec157768017d0ec21eaad845bb
Size
18KB
MD5
d5bf73ec157768017d0ec21eaad845bb
SHA1
2657c07d7cfdc2f7b28e65a8ab97de67506cbadc
SHA256
cb6d45c1281eda69b04c1f9e9f3897c4882da9e19a5a03fba862234d6de80165
SHA512
1e276b908daa6aecf28531cb8886115ac490833d063c1d8434bfed88ccdabca26f94eabf1589d14020b351a49fcecfc6565f67b8119a06875e5c30726b5eeddc
SSDEEP
384:DQ6TBf0/RId67YQXNsB8LG2qz6EJe2vO:c6Tl0lYOsB8LG2qzHJe2vO
Checks for missing Authenticode signature.
resource |
---|
d5bf73ec157768017d0ec21eaad845bb |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetLastError
GetCurrentProcess
GetModuleHandleA
WriteFile
MultiByteToWideChar
lstrcatA
GetTickCount
FindClose
FindFirstFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetModuleFileNameA
VirtualAllocEx
lstrlenA
GetTempPathA
GetWindowsDirectoryA
ReleaseMutex
CreateMutexA
FreeLibrary
GetSystemDirectoryA
GetFileAttributesA
FindNextFileA
MoveFileExA
Sleep
DeleteFileA
CopyFileA
GlobalAlloc
GlobalFree
SetEndOfFile
lstrcpyA
CreateThread
GetCurrentProcessId
CreateFileA
ReadFile
SetFilePointer
CloseHandle
GetFileSize
LoadLibraryA
WriteProcessMemory
GetProcAddress
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
FindWindowA
GetMessageA
EnumWindows
wsprintfA
GetWindowThreadProcessId
SetWindowsHookExA
PostMessageA
LookupPrivilegeValueA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegEnumValueA
AdjustTokenPrivileges
??2@YAPAXI@Z
rand
srand
_stricmp
memset
strlen
strcat
strrchr
strcpy
_except_handler3
strstr
_strlwr
memcpy
sprintf
??3@YAXPAX@Z
GetModuleFileNameExA
EnumProcessModules
faioufoalkdfOn
pfjaoidjglkajd
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ