Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
daa1b7be916d6d33d3e2cd77dcf3f5922b6199826cad11caa2a6aa73692a7664.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
daa1b7be916d6d33d3e2cd77dcf3f5922b6199826cad11caa2a6aa73692a7664.dll
Resource
win10v2004-20240426-en
Target
daa1b7be916d6d33d3e2cd77dcf3f5922b6199826cad11caa2a6aa73692a7664
Size
56KB
MD5
1fcab3b7b4a1aa781926b1a20f647d27
SHA1
0ba0b42bb04224e7d3a5ed38c8359e05723886bc
SHA256
daa1b7be916d6d33d3e2cd77dcf3f5922b6199826cad11caa2a6aa73692a7664
SHA512
86115936c1892f77039d03f29496e374e36296178083fe5023fb1987e922c8b1b6cc716d89197105d78a1ea0089411663bae59a4b3e62d3674f9b0d68f592cd7
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5KOVwYklBq:oyUuAC6xopRbIoYX
Checks for missing Authenticode signature.
resource |
---|
daa1b7be916d6d33d3e2cd77dcf3f5922b6199826cad11caa2a6aa73692a7664 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ