Mek
Mek1
Static task
static1
Behavioral task
behavioral1
Sample
1799388d528fd891eaba868c57b0e168d017e240bc9342b4b9be2db2fd87dbc6.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1799388d528fd891eaba868c57b0e168d017e240bc9342b4b9be2db2fd87dbc6.dll
Resource
win10v2004-20240226-en
Target
1799388d528fd891eaba868c57b0e168d017e240bc9342b4b9be2db2fd87dbc6
Size
56KB
MD5
539c9d846f53c355b1fe1f4ed81d30cd
SHA1
d922c03ee7cc661772d8c32742f7ca3aafebd645
SHA256
1799388d528fd891eaba868c57b0e168d017e240bc9342b4b9be2db2fd87dbc6
SHA512
e1928a97499d6d9a260caf597d5dd653d539387c4cc451feb2ee6dfe149f17fe4985668cad2ae074c5ad113b68799168a09ae8fa5356c0bba4d85bfb2abd6ab7
SSDEEP
768:2MEyU2joCXwPaPOZxZ6pRb0x56OVOyYklJq:oyUuAC6xopRbIGyYH
Checks for missing Authenticode signature.
resource |
---|
1799388d528fd891eaba868c57b0e168d017e240bc9342b4b9be2db2fd87dbc6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WaitForSingleObject
CreateMutexA
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
VirtualAlloc
GetCommandLineA
GetModuleHandleA
??2@YAPAXI@Z
free
strncmp
__CxxFrameHandler
__dllonexit
_onexit
atoi
_ftol
strrchr
strchr
??3@YAXPAX@Z
memmove
malloc
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
Mek
Mek1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ