@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
48b6306ed67507b6fcb2cc6ae9821fc1a1530b6d092c8b7c0027251ece015d2f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
48b6306ed67507b6fcb2cc6ae9821fc1a1530b6d092c8b7c0027251ece015d2f.exe
Resource
win10v2004-20240508-en
Target
48b6306ed67507b6fcb2cc6ae9821fc1a1530b6d092c8b7c0027251ece015d2f.exe
Size
57KB
MD5
8f674099c3d7c7ebc25b50f2c4332510
SHA1
e3dc32310c2edf826d340808b40086d66a999ae8
SHA256
48b6306ed67507b6fcb2cc6ae9821fc1a1530b6d092c8b7c0027251ece015d2f
SHA512
327df627365fb9d060b894c46a5e5768ba3ac4b05cc19b885b211b5eecfb6078abcf45bcbc2b9fc5594eda643e6a000e4516dd8bd702cb5fdd05c830bf9872ad
SSDEEP
768:Wvyab38NaHFi2GjQnEJt8jRCKGkcebvCYY6:fAsNaHFq8EbKGsaYY6
Checks for missing Authenticode signature.
resource |
---|
48b6306ed67507b6fcb2cc6ae9821fc1a1530b6d092c8b7c0027251ece015d2f.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualAlloc
UnhandledExceptionFilter
WriteFile
VirtualFree
GetStdHandle
GlobalFree
GetStartupInfoA
IsDBCSLeadByte
ExitProcess
FindResourceA
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
EnterCriticalSection
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
FreeResource
GetCommandLineA
GetVersion
CloseHandle
CreateFileA
GetEnvironmentStrings
GlobalMemoryStatus
GlobalHandle
CreateProcessA
InitializeCriticalSection
LoadResource
LeaveCriticalSection
GetFileType
LockResource
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SizeofResource
SleepEx
RegOpenKeyExA
SetSecurityDescriptorDacl
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
StretchDIBits
SetStretchBltMode
SelectPalette
RealizePalette
CreatePalette
LoadCursorA
GetDesktopWindow
GetClientRect
EnumThreadWindows
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
LoadStringA
BeginPaint
wsprintfA
UpdateWindow
ShowWindow
SetWindowTextA
RegisterClassA
PostQuitMessage
WaitForInputIdle
PeekMessageA
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE