Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
3c51503a796ef69a71ccd96cdd3a345711a87ef3ab774016f9f4ef091ddcc541.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3c51503a796ef69a71ccd96cdd3a345711a87ef3ab774016f9f4ef091ddcc541.dll
Resource
win10v2004-20240508-en
Target
3c51503a796ef69a71ccd96cdd3a345711a87ef3ab774016f9f4ef091ddcc541
Size
56KB
MD5
f5871128d0049a3e2b52d4ce3c52f39d
SHA1
2706f8cf773c629166c44745fcb0546c8d147354
SHA256
3c51503a796ef69a71ccd96cdd3a345711a87ef3ab774016f9f4ef091ddcc541
SHA512
d63f109064a082322c61c57405d5da0f3216bc6fd53a34c03bfc4c82ce565b04aa5fa92e5ae9a0a70c7b7656ec1946d2383fae5f27d2cf17901d91fb67dd4eb5
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5sOVrYklSq:oyUuAC6xopRbIRYm
Checks for missing Authenticode signature.
resource |
---|
3c51503a796ef69a71ccd96cdd3a345711a87ef3ab774016f9f4ef091ddcc541 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ