Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
e4e5a25932adc74bebfff316dca2dff616704089c41efa09eae70477a8b2d5d6.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e4e5a25932adc74bebfff316dca2dff616704089c41efa09eae70477a8b2d5d6.dll
Resource
win10v2004-20240508-en
Target
e4e5a25932adc74bebfff316dca2dff616704089c41efa09eae70477a8b2d5d6
Size
56KB
MD5
8b7608e0d6e3fbbe139083a1e3b70296
SHA1
f70b5734377ca45c6345996befd3b634afc3b97a
SHA256
e4e5a25932adc74bebfff316dca2dff616704089c41efa09eae70477a8b2d5d6
SHA512
b0d32ddf343da552784a98d93b505376a51a1ce413f6e3ab521d6b0930adac0b728ba730d61d9abf5d42f162d2408a90a5d16703877130a0a0967e95d2c58586
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5cOVqYklwq:oyUuAC6xopRbIwYY
Checks for missing Authenticode signature.
resource |
---|
e4e5a25932adc74bebfff316dca2dff616704089c41efa09eae70477a8b2d5d6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ