TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
d92319d9794168789cfddedb4dc2bf7f1a34c14bb2bb6d9c3fb7ef886f2f17df.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d92319d9794168789cfddedb4dc2bf7f1a34c14bb2bb6d9c3fb7ef886f2f17df.exe
Resource
win10v2004-20240709-en
Target
d92319d9794168789cfddedb4dc2bf7f1a34c14bb2bb6d9c3fb7ef886f2f17df
Size
3.4MB
MD5
e1aa3897f23c4578ed89ca45b70ef748
SHA1
ea58f5d5197aac1801dc6cce0829b2a7f5071b5e
SHA256
d92319d9794168789cfddedb4dc2bf7f1a34c14bb2bb6d9c3fb7ef886f2f17df
SHA512
6ffa0a4f146513c34152e1b1f1839b698e65d8b2798c3419607319fac61183504c84884015b605484f89fc90bbe9803091efb02dbafad71f2175a51e198b307b
SSDEEP
49152:XkNEiWv1mYomONgcrCV4urEgfqPbv6RppwvlscATu54S3hkPlW6XrL:XCENowc2V4FHeRppwfupb
Checks for missing Authenticode signature.
resource |
---|
d92319d9794168789cfddedb4dc2bf7f1a34c14bb2bb6d9c3fb7ef886f2f17df |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetFileType
GetACP
CloseHandle
LocalFree
VirtualProtect
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FindNextFileW
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
FileTimeToLocalFileTime
GetModuleHandleW
FreeLibrary
HeapDestroy
FileTimeToDosDateTime
ReadFile
GetLastError
GetModuleFileNameW
SetLastError
CreateThread
CompareStringW
CopyFileW
LoadLibraryA
ResetEvent
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
FileTimeToSystemTime
GetCurrentThreadId
GetShortPathNameW
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
SuspendThread
GetTickCount
WritePrivateProfileStringW
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
SetThreadPriority
GetCurrentProcess
VirtualAlloc
GetCommandLineW
GetSystemInfo
GetTempPathW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
LCMapStringW
VerSetConditionMask
GetDiskFreeSpaceW
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
GetConsoleCP
lstrlenW
SetEndOfFile
QueryPerformanceCounter
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
GetLocaleInfoW
CreateFileW
DeleteFileW
GetLocalTime
GetEnvironmentVariableW
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
TlsGetValue
GetDateFormatW
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
GetPrivateProfileStringW
SetThreadLocale
GetThreadLocale
ShellExecuteW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CharLowerBuffW
CharUpperW
PeekMessageW
SetActiveWindow
GetSystemMetrics
PostMessageW
MessageBoxW
SetForegroundWindow
IsCharAlphaNumericW
CharUpperBuffW
CharNextW
BringWindowToTop
MsgWaitForMultipleObjects
LoadStringW
FindWindowW
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
memcpy
NetWkstaGetInfo
NetApiBufferFree
RegEnumKeyExW
RegFlushKey
RegQueryValueExW
GetUserNameW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetTimeouts
WinHttpSetStatusCallback
WinHttpConnect
WinHttpReceiveResponse
WinHttpQueryAuthSchemes
WinHttpGetProxyForUrl
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpWriteData
WinHttpSetCredentials
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSendRequest
WinHttpQueryOption
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ