Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
0de59163dd79a3a7a6cdadfb3cd4e1a495bd44a442b4209fc8d8372384fdb486.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0de59163dd79a3a7a6cdadfb3cd4e1a495bd44a442b4209fc8d8372384fdb486.dll
Resource
win10v2004-20240508-en
Target
0de59163dd79a3a7a6cdadfb3cd4e1a495bd44a442b4209fc8d8372384fdb486
Size
56KB
MD5
ee007f8afa5eef9005a970af223a2d16
SHA1
b0bdf0b3d2577f00e6a04042c4edbca3ac8143af
SHA256
0de59163dd79a3a7a6cdadfb3cd4e1a495bd44a442b4209fc8d8372384fdb486
SHA512
308d5084f98913fc78a2ebfa5e2d0d68b1a7e87cc94d08e198e1a0e5ddac99a9195f54f4d5b4107674162794680696592da6f3406c254f0f94a498ae6f27e29d
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5TOV8Ykl2q:oyUuAC6xopRbIjYO
Checks for missing Authenticode signature.
resource |
---|
0de59163dd79a3a7a6cdadfb3cd4e1a495bd44a442b4209fc8d8372384fdb486 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ