?XJ000001@YS0166@@IAEXXZ
?XJ000002@YS0166@@IAEXXZ
?XJ000003@YS0166@@IAEXXZ
Static task
static1
Behavioral task
behavioral1
Sample
f184553d5c687826dd6345f4c1aad78bcfe6615158e00511c0833bb1fcf89a39.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f184553d5c687826dd6345f4c1aad78bcfe6615158e00511c0833bb1fcf89a39.exe
Resource
win10v2004-20240611-en
Target
f184553d5c687826dd6345f4c1aad78bcfe6615158e00511c0833bb1fcf89a39
Size
9.2MB
MD5
68600eef748a1c873a64f78a6966a8fd
SHA1
1780f32dd28b84878e00bb92ba1cb87d6067ac91
SHA256
f184553d5c687826dd6345f4c1aad78bcfe6615158e00511c0833bb1fcf89a39
SHA512
f3f069930e10a31c51acc441f730d636f55d0bc8a56fbc93c25b8f5bdbe40da63bbd39b541e4de6ac8ef71642e79a2d8d177905a70009155f77db0583b33c55f
SSDEEP
196608:3oK56RLrqF76M4FOASzO/LaZU/RUM15qXFM1Kh3Hi1J19i1rjidCuC5M5JjVpRT1:3/56RLrqF76M4FOASzO/LaZWRUM15qX+
Checks for missing Authenticode signature.
resource |
---|
f184553d5c687826dd6345f4c1aad78bcfe6615158e00511c0833bb1fcf89a39 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
recv
getaddrinfo
gethostname
freeaddrinfo
WSAStartup
WSACleanup
htons
gethostbyaddr
gethostbyname
inet_addr
sendto
bind
recvfrom
getpeername
getsockname
inet_ntoa
getnameinfo
__WSAFDIsSet
ioctlsocket
shutdown
getsockopt
connect
accept
closesocket
select
send
WSAGetLastError
setsockopt
socket
CertFindCertificateInStore
CertGetNameStringA
CertGetNameStringW
CertFreeCertificateContext
CertCloseStore
CryptMsgGetParam
CryptQueryObject
CryptMsgClose
RtlRemoveVectoredExceptionHandler
RtlAddVectoredExceptionHandler
NtOpenSymbolicLinkObject
RtlUnwind
VerSetConditionMask
GetFileAttributesW
GetCurrentProcessId
GetTickCount64
RaiseException
DuplicateHandle
GetExitCodeThread
GetCurrentThreadId
GetUserDefaultUILanguage
GetLocalTime
GetACP
GetTempPathA
GetDiskFreeSpaceA
SystemTimeToFileTime
SetConsoleCtrlHandler
GetCurrentDirectoryA
GetModuleHandleA
TerminateProcess
SetThreadPriority
SetPriorityClass
GetCurrentThread
HeapFree
VirtualQuery
VirtualProtect
GetModuleFileNameA
GetVersionExA
SetLastError
GetNativeSystemInfo
GetSystemWindowsDirectoryA
GetSystemInfo
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
IsBadReadPtr
GetModuleHandleExA
Process32First
Process32Next
CloseHandle
UnmapViewOfFile
GetLastError
MapViewOfFileEx
CreateDirectoryA
ReleaseMutex
CreateMutexA
CreateSemaphoreA
ReleaseSemaphore
GetProcessTimes
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetFileSizeEx
SetFilePointer
SwitchToThread
LocalFree
CreateFileMappingA
WriteFile
GetProcAddress
CreateFileA
QueryPerformanceFrequency
SetEndOfFile
QueryPerformanceCounter
GetTickCount
FormatMessageA
WaitForSingleObject
OpenProcess
GetSystemTimeAsFileTime
CreateFileW
GetFileInformationByHandle
DeviceIoControl
GetCurrentDirectoryW
GetFileTime
CreateDirectoryW
SetFileTime
SetFilePointerEx
GetEnvironmentVariableW
GetWindowsDirectoryW
GetFullPathNameW
WideCharToMultiByte
SetFileAttributesW
DeleteFileW
RemoveDirectoryW
FlushFileBuffers
CopyFileExW
CreateDirectoryExW
SetCurrentDirectoryW
GetFileAttributesExW
FormatMessageW
MoveFileExW
GetModuleHandleW
FindFirstFileW
FindNextFileW
AreFileApisANSI
MultiByteToWideChar
GetModuleFileNameW
LoadLibraryA
FreeLibrary
SetCurrentDirectoryA
GetFileAttributesA
SearchPathA
GetEnvironmentVariableA
GetFullPathNameA
GetSystemTime
FileTimeToSystemTime
GetTimeZoneInformation
SetFileApisToOEM
SetFileApisToANSI
GetCurrentProcess
FlushConsoleInputBuffer
GetNumberOfConsoleInputEvents
ReadConsoleInputA
Sleep
GetConsoleMode
GetStdHandle
CreateProcessA
GetExitCodeProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteFileA
CopyFileA
ExitThread
ReadFile
GlobalFree
GetProfileStringA
IsWow64Process
VerifyVersionInfoW
GetProfileIntA
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetCPInfo
CreateThread
FreeLibraryAndExitThread
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetCommandLineW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleCP
ReadConsoleW
SetStdHandle
GetStringTypeW
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
WriteConsoleW
OutputDebugStringW
EncodePointer
DecodePointer
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
LocalAlloc
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileSectionA
WritePrivateProfileStringA
OpenFileMappingA
MapViewOfFile
CreateToolhelp32Snapshot
Thread32First
Thread32Next
ProcessIdToSessionId
CreateEventA
OpenEventA
WaitForMultipleObjects
SetEvent
ResetEvent
PulseEvent
IsBadWritePtr
OpenSemaphoreA
WinExec
FlushInstructionCache
GetVersion
HeapDestroy
IsBadStringPtrA
IsBadStringPtrW
LockFile
UnlockFile
SetErrorMode
GetDriveTypeA
GetThreadContext
SetThreadContext
GetSystemFirmwareTable
EnumSystemFirmwareTables
GetLogicalDrives
CreateEventW
GetOverlappedResult
OpenMutexA
TryEnterCriticalSection
InitializeCriticalSectionEx
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
InitializeSListHead
WaitForSingleObjectEx
HeapAlloc
GetStartupInfoW
HeapCreate
GetProcessHeap
GetConsoleScreenBufferInfo
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
InterlockedPushEntrySList
InterlockedFlushSList
FindFirstFileExW
GetCommandLineA
SetConsoleMode
GetLocaleInfoW
SetTimer
OffsetRect
UpdateWindow
SendDlgItemMessageA
ShowWindow
UnregisterClassA
SetWindowTextA
MoveWindow
SetWindowPos
DrawIcon
GetWindowPlacement
IsWindowVisible
GetWindowRect
PeekMessageA
SetDlgItemTextA
EndPaint
SetFocus
GetDlgItem
EndDialog
wsprintfA
PostMessageA
EnumWindows
GetAncestor
GetWindowThreadProcessId
LoadStringA
DestroyWindow
TranslateMessage
CallMsgFilterA
DispatchMessageA
EnumDisplayDevicesA
MessageBoxA
AppendMenuA
DrawMenuBar
GetSystemMetrics
CharLowerBuffA
GetSystemMenu
CharUpperBuffA
SetWindowPlacement
MessageBoxW
ShellExecuteExA
InitializeSecurityDescriptor
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
GetUserNameA
EqualSid
LookupAccountNameA
LookupAccountSidA
FreeSid
OpenThreadToken
AllocateAndInitializeSid
RegCreateKeyExA
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
RegDeleteKeyA
RegFlushKey
StartServiceA
QueryServiceConfigA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
QueryServiceStatusEx
SetSecurityDescriptorDacl
SHDeleteKeyA
GetModuleFileNameExA
PowerReadFriendlyName
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetIpAddrTable
WinHttpGetDefaultProxyConfiguration
WinHttpOpen
WinHttpCloseHandle
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinVerifyTrust
?XJ000001@YS0166@@IAEXXZ
?XJ000002@YS0166@@IAEXXZ
?XJ000003@YS0166@@IAEXXZ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE