Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
1eb129f6208c13c8b336b90cdee816f3a3962e68fce4561310413f4a4a3cf226.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1eb129f6208c13c8b336b90cdee816f3a3962e68fce4561310413f4a4a3cf226.dll
Resource
win10v2004-20240426-en
Target
1eb129f6208c13c8b336b90cdee816f3a3962e68fce4561310413f4a4a3cf226
Size
56KB
MD5
4ed75071749be228d4151e60acfb5b19
SHA1
9d1b134201746b1dbf9cb123d396bad4c39abefd
SHA256
1eb129f6208c13c8b336b90cdee816f3a3962e68fce4561310413f4a4a3cf226
SHA512
3322459bf5c7de7ccb3e5a11cf2336f7abc4fdf1a38877fff202d47452a50812be80a4504826b6cbc714b1ec62d96de9dbf0fc9d18c1637bab61316afdc8500e
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5KOVtYkllq:oyUuAC6xopRbIFYL
Checks for missing Authenticode signature.
resource |
---|
1eb129f6208c13c8b336b90cdee816f3a3962e68fce4561310413f4a4a3cf226 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ