AccreditXYZ
OpenLinuxDemonA
Static task
static1
Behavioral task
behavioral1
Sample
deea462c37b1cad2ddaed63a1e589336.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
deea462c37b1cad2ddaed63a1e589336.dll
Resource
win10v2004-20240226-en
Target
deea462c37b1cad2ddaed63a1e589336
Size
41KB
MD5
deea462c37b1cad2ddaed63a1e589336
SHA1
894257f8d5fd62eafc419b17dea6ed33c97be851
SHA256
22af87a1850dcde7e62f99ac39c90ac9972a48516b9694f6233c5ed2a09008ff
SHA512
2105714a5c790d986b6d99841b481bff04ffa28d9d78db87481f07f3626706944b888ac9927a44d3d290de4198564866edef2f792069542bad9c9f7f5f34b286
SSDEEP
768://TCue2darCpTtL1wAP0So9htmTZrdXi2+eBEfRA/eEWZ5qv:6y+CpTtL15ZovtmriSBsReNuq
Checks for missing Authenticode signature.
resource |
---|
deea462c37b1cad2ddaed63a1e589336 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetTickCount
GetCurrentThreadId
VirtualAlloc
VirtualFree
MultiByteToWideChar
GetProcAddress
TlsAlloc
GetVersion
GetVersionExA
GetStringTypeW
GetStringTypeA
GetCommandLineA
ExitProcess
TlsSetValue
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
LoadLibraryA
LCMapStringA
LCMapStringW
RtlUnwind
GetSystemMetrics
AccreditXYZ
OpenLinuxDemonA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ