Off
On
SetVM
Static task
static1
Behavioral task
behavioral1
Sample
e24ca43a7034404d786fa973cdda1334.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e24ca43a7034404d786fa973cdda1334.dll
Resource
win10v2004-20231215-en
Target
e24ca43a7034404d786fa973cdda1334
Size
240KB
MD5
e24ca43a7034404d786fa973cdda1334
SHA1
5819d3dba5c9165822e67693822bbc5127e0cecb
SHA256
3b9416289cc37e1d5dc5514fd8beffa4d769672275d80e95b993276a1ba7d1c1
SHA512
f1e91e1e5d33619805cb06db59132952ad7a41e8f9336bd2813a4c681bc62219a4823531d6798dd07996c2dbd743d9603e2d7039879d52df263f849d07dbd503
SSDEEP
6144:vPF4SOVruTs5H2R6YuLJcec3aVTBMlmWS30jZzK3mplkQz:XF4SeruTZR6HLWh3aVTOlmhmzK3mplkw
Checks for missing Authenticode signature.
resource |
---|
e24ca43a7034404d786fa973cdda1334 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHGetFolderPathA
HttpSendRequestA
InternetReadFile
InternetSetCookieA
InternetOpenA
InternetGetConnectedState
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryOptionA
InternetSetOptionA
InternetOpenUrlA
InternetCloseHandle
GetVolumeInformationA
GetVersionExA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
ReadFile
GetModuleFileNameA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
Sleep
SetFileAttributesA
GetTempPathA
FreeLibrary
GetProcAddress
LoadLibraryA
MoveFileA
CreateDirectoryA
GetFileSize
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
GetWindowsDirectoryA
VirtualFree
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
ReleaseMutex
WaitForSingleObject
DeleteFileA
OpenEventA
GetFileTime
lstrcatA
lstrcpynA
CreateMutexA
OpenMutexA
ExitProcess
FreeLibraryAndExitThread
TerminateThread
GetExitCodeThread
CreateThread
LocalAlloc
FormatMessageA
SystemTimeToFileTime
GetLocalTime
CopyFileA
SetEvent
GetModuleHandleA
GetCurrentProcessId
SetErrorMode
SetWaitableTimer
CreateWaitableTimerA
CreateEventA
SetUnhandledExceptionFilter
SetEndOfFile
FindCloseChangeNotification
SetLastError
TerminateProcess
OpenProcess
lstrcpyA
GetFileAttributesA
CreateProcessA
GetCurrentProcess
ExitThread
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
Process32Next
Process32First
CreateToolhelp32Snapshot
InterlockedDecrement
OpenFileMappingA
GetShortPathNameA
OutputDebugStringA
GetStringTypeW
GetStringTypeA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetStdHandle
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
FlushFileBuffers
GetOEMCP
GetTimeZoneInformation
TlsGetValue
TlsSetValue
TlsFree
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
InterlockedIncrement
VirtualProtect
GetSystemInfo
VirtualQuery
RtlUnwind
LocalFree
TlsAlloc
IsBadWritePtr
HeapCreate
GetTickCount
QueryPerformanceCounter
GetProcessHeap
HeapSize
HeapReAlloc
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
wsprintfA
DefWindowProcA
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageA
CreateWindowExA
SetWindowLongA
GetMessageA
DispatchMessageA
PostMessageA
LoadStringA
wvsprintfA
LookupPrivilegeValueA
AdjustTokenPrivileges
SetSecurityInfo
SetEntriesInAclA
SetNamedSecurityInfoA
RegDeleteKeyA
RegEnumKeyExA
RegFlushKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
ShellExecuteA
CoCreateInstance
CoInitializeEx
OleRun
VariantClear
GetErrorInfo
SysAllocString
StrRChrA
StrCmpNIA
StrStrIA
PathFileExistsA
StrChrA
Off
On
SetVM
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ