Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
25702b1a4e84165b69c8575fd0faeeedcfd7be075eacb8efcf917063c9576fb6.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25702b1a4e84165b69c8575fd0faeeedcfd7be075eacb8efcf917063c9576fb6.dll
Resource
win10v2004-20240426-en
Target
25702b1a4e84165b69c8575fd0faeeedcfd7be075eacb8efcf917063c9576fb6
Size
56KB
MD5
e539f3becb9287ce8b96edf2c6147477
SHA1
47e5fe0f8a3e0f63bb49619bfcd0ed07b8878e74
SHA256
25702b1a4e84165b69c8575fd0faeeedcfd7be075eacb8efcf917063c9576fb6
SHA512
0f340f3bf640704c343da0eb60d988a4fc29bb64d85311748a8405763c29c91398526b92edf11da223bf790eff7506f2f3523707b727cf740ab221b758581e0c
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5HOOVaYklQq:oyUuAC6xopRbIHeYw
Checks for missing Authenticode signature.
resource |
---|
25702b1a4e84165b69c8575fd0faeeedcfd7be075eacb8efcf917063c9576fb6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ