Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
9a13b78efa247d71bb0818806a4a73e899a84854b2effcafed7c5c2c9d3badf3.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9a13b78efa247d71bb0818806a4a73e899a84854b2effcafed7c5c2c9d3badf3.dll
Resource
win10v2004-20240508-en
Target
9a13b78efa247d71bb0818806a4a73e899a84854b2effcafed7c5c2c9d3badf3
Size
56KB
MD5
461a4e2c46e4f208f5a4b1558b5ca08d
SHA1
842795c843cc1aaab6c646ab2be84a616c2a4b31
SHA256
9a13b78efa247d71bb0818806a4a73e899a84854b2effcafed7c5c2c9d3badf3
SHA512
8900a8a483a399fa441c7289edee3e073c9e04881d286f080f9a66416097251bf526d7703af90319c9794c02a605090a9b438f941cc5f99450e732db4e2d71d1
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x5LOVbYklnq:oyUuAC6xopRbIUY5
Checks for missing Authenticode signature.
resource |
---|
9a13b78efa247d71bb0818806a4a73e899a84854b2effcafed7c5c2c9d3badf3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ