Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
efa8f7c24724c346e78d0ab3130411ed827cd59894ef988fc74e63057c6865a3.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
efa8f7c24724c346e78d0ab3130411ed827cd59894ef988fc74e63057c6865a3.dll
Resource
win10v2004-20240508-en
Target
efa8f7c24724c346e78d0ab3130411ed827cd59894ef988fc74e63057c6865a3
Size
56KB
MD5
7d5b580afc918fe1a38e478566bc8df7
SHA1
5fc1ee40f4423da141c054ec5986db1db8b064c2
SHA256
efa8f7c24724c346e78d0ab3130411ed827cd59894ef988fc74e63057c6865a3
SHA512
6a12851a918b4f86adf9301e873f7f1ebd4cbd540447cdda3bac6c7b691f8a5f2ddacb02ca9a2f97a6651d876799f63636517bad540bcf2d08d914205a75d4cd
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5KOVVYkllq:oyUuAC6xopRbIdYL
Checks for missing Authenticode signature.
resource |
---|
efa8f7c24724c346e78d0ab3130411ed827cd59894ef988fc74e63057c6865a3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ