Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
f64a0eeb48a48b067e5ad7723850d840cd55f30a11d9e4a2eb40bbb6ce124fab.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f64a0eeb48a48b067e5ad7723850d840cd55f30a11d9e4a2eb40bbb6ce124fab.dll
Resource
win10v2004-20240508-en
Target
f64a0eeb48a48b067e5ad7723850d840cd55f30a11d9e4a2eb40bbb6ce124fab
Size
56KB
MD5
008c3fb66f5ea3bef650fa384c6f1863
SHA1
99069c0b9eccf2b2e3ffe565867bb795c3d6df0e
SHA256
f64a0eeb48a48b067e5ad7723850d840cd55f30a11d9e4a2eb40bbb6ce124fab
SHA512
0f6511a324796fa9dab8ffaccc832dd3f0a13e3d97558e0575bd6f30e9c54a57bbf0a3189e9e3b37b46d62313c38a959d454b77537c06dbc3b62b97ecccaec3f
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5OOVJYklEq:oyUuAC6xopRbIdY8
Checks for missing Authenticode signature.
resource |
---|
f64a0eeb48a48b067e5ad7723850d840cd55f30a11d9e4a2eb40bbb6ce124fab |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ