Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
0bc442342fde62eaab1501dfa7ea9dc8d36a30498cdcc13eb8eb65d3abd44c8a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0bc442342fde62eaab1501dfa7ea9dc8d36a30498cdcc13eb8eb65d3abd44c8a.dll
Resource
win10v2004-20240508-en
Target
0bc442342fde62eaab1501dfa7ea9dc8d36a30498cdcc13eb8eb65d3abd44c8a
Size
56KB
MD5
98c62c1a966754f4d44297eb8cf84a3f
SHA1
de93ec0e2e7b1561733e20596ea7afb5d3b8d644
SHA256
0bc442342fde62eaab1501dfa7ea9dc8d36a30498cdcc13eb8eb65d3abd44c8a
SHA512
ba3046296993ec04455db2c9d79bc0801c2cb237fb582a293656ab0e27e6ec1491f2a471d1724e303018db90f83cf756cebaed7c168f50cc193408d3f90a9f4d
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5KOVTYklTq:oyUuAC6xopRbILYN
Checks for missing Authenticode signature.
resource |
---|
0bc442342fde62eaab1501dfa7ea9dc8d36a30498cdcc13eb8eb65d3abd44c8a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ