Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
15769f172d299de7bc9f8528be313e0b614f63ccc0baaa30c1c2e2d4cae21f04.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
15769f172d299de7bc9f8528be313e0b614f63ccc0baaa30c1c2e2d4cae21f04.dll
Resource
win10v2004-20240508-en
Target
15769f172d299de7bc9f8528be313e0b614f63ccc0baaa30c1c2e2d4cae21f04
Size
56KB
MD5
d325667eaa94eee02c3e830180951448
SHA1
e2fac28157a86f4e86d741e3d6526930bd3f6c05
SHA256
15769f172d299de7bc9f8528be313e0b614f63ccc0baaa30c1c2e2d4cae21f04
SHA512
7bb8cc8b294625b67db14e7f68517c3fcc206e5bd6a1ad58559a7791bf8701b12fe2893b0a6fb8086953c1a14f8b07f9044b2bcca3ee186006cfd95900fe6fcf
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5tOVOYklNq:oyUuAC6xopRbILYD
Checks for missing Authenticode signature.
resource |
---|
15769f172d299de7bc9f8528be313e0b614f63ccc0baaa30c1c2e2d4cae21f04 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ