ppp
qqq
Static task
static1
Behavioral task
behavioral1
Sample
d778b1b7c5caa0201cd4ba03dacd203b.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d778b1b7c5caa0201cd4ba03dacd203b.dll
Resource
win10v2004-20240226-en
Target
d778b1b7c5caa0201cd4ba03dacd203b
Size
24KB
MD5
d778b1b7c5caa0201cd4ba03dacd203b
SHA1
c90ca183321bf7bca2bc7f4fac331e4a5315cdfa
SHA256
20bc4c57d4342fd6329713649901fc1d15e008b499943e528eaeba3b86896a19
SHA512
adb7140888d50757bea2c92ca190459279fbb0ad65a1fa845d1cf66b3ddbd838e20d1b504efd1118223d73788f56409c007769d88c2ebd7a8f8f6a257dec63f3
SSDEEP
384:IiAyD1VOPbiOXeczQsywtfuJkhx2r5sfJ5/1nd67TE5DTHVIkzeW3nvz8uvh:IJyDWfvcNquJkKr5yJR767TeD553vzn5
Checks for missing Authenticode signature.
resource |
---|
d778b1b7c5caa0201cd4ba03dacd203b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcessId
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
GetProcAddress
VirtualAlloc
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
SetFilePointer
CreateMutexA
VirtualProtectEx
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
lstrcatA
CallNextHookEx
GetWindowTextA
SetWindowsHookExA
GetWindowThreadProcessId
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
malloc
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcat
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
strcmp
__CxxFrameHandler
free
_initterm
ppp
qqq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ