RunW
runW
Static task
static1
Behavioral task
behavioral1
Sample
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d.dll
Resource
win10v2004-20240226-en
Target
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d
Size
237KB
MD5
1ac3f71feece118a03c9e23af063f6d1
SHA1
bbc3979075e0574e54a5ead497fcba95fcc78fc0
SHA256
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d
SHA512
5e75afffb1212057a9431818b54c9d08e4714b316593fd1eb4fe4abf49e85c7ca617d3b8206d97f42278060aee95c1e797df1848f178bded21c52773a5fd65c3
SSDEEP
3072:xpZMSVmCw3tF6iql+IKDQau58yJ5WIxFGddWMf+fmf7eATjiMRnIle8E:hnm78iqIIRauayJ8rhVT9nIle
Checks for missing Authenticode signature.
Processes:
resource |
---|
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetLogicalDrives
GetOEMCP
GetCommandLineW
GetCurrentProcess
GetThreadErrorMode
GetSystemDefaultUILanguage
GetUserDefaultLangID
GetThreadLocale
FlushProcessWriteBuffers
GetLargePageMinimum
UnregisterApplicationRecoveryCallback
IsSystemResumeAutomatic
GetACP
GetCommandLineA
GetTickCount64
GetLastError
GetCurrentThread
TlsAlloc
SwitchToThread
GetCurrentProcessorNumber
GetTickCount
GetEnvironmentStringsW
IsDebuggerPresent
GetUserDefaultUILanguage
GetCurrentThreadId
GetThreadUILanguage
GetErrorMode
AreFileApisANSI
VirtualAlloc
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
TerminateProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
SetProcessDPIAware
GetProcessWindowStation
GetDesktopWindow
GetMenuCheckMarkDimensions
CreateMenu
GetMessageExtraInfo
GetFocus
GetClipboardViewer
GetOpenClipboardWindow
GetCursor
GetShellWindow
AnyPopup
InSendMessage
GetCapture
CloseClipboard
EmptyClipboard
CountClipboardFormats
GetKBCodePage
IsProcessDPIAware
GetForegroundWindow
GetDialogBaseUnits
GetMessageTime
IsWow64Message
DestroyCaret
GetClipboardSequenceNumber
GdiFlush
InitNetworkAddressControl
CoFreeUnusedLibraries
OleUninitialize
CoUninitialize
RunW
runW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ