Exec
ExecToLog
ExecToStack
Static task
static1
Behavioral task
behavioral1
Sample
c618ec5834c9e467355f0a9d7b364e34a63c2b30ef15054cf22024c56ffd6fb5.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c618ec5834c9e467355f0a9d7b364e34a63c2b30ef15054cf22024c56ffd6fb5.dll
Resource
win10v2004-20240419-en
Target
c618ec5834c9e467355f0a9d7b364e34a63c2b30ef15054cf22024c56ffd6fb5
Size
42KB
MD5
163563b935b677ce23b4a8ed7c04b8f6
SHA1
461daf4fa01562329f37b94835dde10a9d726cbc
SHA256
c618ec5834c9e467355f0a9d7b364e34a63c2b30ef15054cf22024c56ffd6fb5
SHA512
eb8ffb23393e36456fcf1a342af0662d9a01597e69a96e3dc30315a3e0702fe715ef0948cc143b043bc22ed9d7f1ae0b21c57f3063212fb94d797e8d701a287d
SSDEEP
768:m+6yo2xjLq1x0NWtqdihTKCldkYwkdpnoyAXFU:N6y1tw0NWfKW3XoP2
Checks for missing Authenticode signature.
resource |
---|
c618ec5834c9e467355f0a9d7b364e34a63c2b30ef15054cf22024c56ffd6fb5 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyW
MultiByteToWideChar
lstrlenA
lstrcmpiW
lstrlenW
ExitProcess
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
lstrcpynW
GetCommandLineW
Sleep
TerminateProcess
GlobalReAlloc
GlobalUnlock
GlobalSize
ReadFile
GetModuleHandleW
GetTickCount
GetStartupInfoW
CreatePipe
GetVersionExW
GlobalLock
DeleteFileW
lstrcatW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
CopyFileW
GetTempFileNameW
GlobalFree
GlobalAlloc
GetModuleFileNameW
GetProcAddress
PeekNamedPipe
GetCurrentProcess
CharPrevW
CharNextW
SendMessageW
FindWindowExW
wsprintfW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ