Gorgeous
Probka
Static task
static1
Behavioral task
behavioral1
Sample
dfc24fa837b6cd3210e7ea0802db3dcf7bb1f85bff2c1b4bda4c3c599821bf8c.exe
Resource
win7-20240221-en
Target
dfc24fa837b6cd3210e7ea0802db3dcf7bb1f85bff2c1b4bda4c3c599821bf8c
Size
708KB
MD5
e852e90f778f616f09900b4f1b05c03c
SHA1
91b6442fa2c070f07437a887fbb42805bf59b8cb
SHA256
dfc24fa837b6cd3210e7ea0802db3dcf7bb1f85bff2c1b4bda4c3c599821bf8c
SHA512
9be52c15f29c65e3b14601e997bfc4943709e162e13708a8464b230196cc822548b0219f2df5e5619ac303e1da94c66fbff5cdb1a02d50a8099f31f7862dfdd0
SSDEEP
12288:eqoP5A6FJP3lTedx7jsSeQOZBVJAoeXI5eN9zmTX6uaTcPap:eV5fbP3Jek5Pe4oN926uaYP
Checks for missing Authenticode signature.
resource |
---|
dfc24fa837b6cd3210e7ea0802db3dcf7bb1f85bff2c1b4bda4c3c599821bf8c |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetEnvironmentVariableW
RemoveVectoredExceptionHandler
FindResourceA
WriteConsoleOutputCharacterW
GetModuleHandleExA
FindResourceExW
LoadResource
InterlockedIncrement
SetConsoleTextAttribute
GetCurrentProcess
CancelWaitableTimer
ConnectNamedPipe
SetFileTime
GetCompressedFileSizeW
TzSpecificLocalTimeToSystemTime
GlobalFindAtomA
GetLocaleInfoW
GetSystemTimeAdjustment
GetFileAttributesA
SetTimeZoneInformation
TerminateProcess
GetAtomNameW
FileTimeToSystemTime
GlobalUnlock
SetLastError
OpenWaitableTimerW
LocalAlloc
SetConsoleOutputCP
AddAtomA
GetTapeParameters
GlobalWire
VirtualProtect
LocalFree
lstrcpyW
SetFileAttributesW
SetEnvironmentVariableA
CompareStringW
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
VirtualAlloc
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileA
CloseHandle
FlushFileBuffers
GetTimeZoneInformation
CompareStringA
GetModuleHandleA
GetMonitorInfoA
Gorgeous
Probka
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ