__dbk_fcall_wrapper
dbkFCallWrapperAddr
mujq01k6k4zfospx
Static task
static1
Behavioral task
behavioral1
Sample
mek_n_dll.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
mek_n_dll.dll
Resource
win10v2004-20240709-en
Target
mek_n_dll.dll
Size
20.7MB
MD5
c7eff1e4ab70327d7bc3e40f688890ac
SHA1
b3d1a32e9016e6cc3e8adf8eb6c87aeb1fa308b8
SHA256
e7298a9a479f32d7ea707f9596907597132961c7b55d893c2364fbf40cb06414
SHA512
0079083988c484258975b70aa190a09c6163723f245dde243002a117db12dcd28abdba6a2a2730c1bfa2e92597fee0e51b6eed0f2df88bfd8b352ef8b8a859a7
SSDEEP
393216:MRQOfaFEhINMwpOih+Sx92Gp6ElwrKox4yO:saEHiBxUGhFq
Checks for missing Authenticode signature.
resource |
---|
mek_n_dll.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PlaySoundW
FindFirstUrlCacheEntryW
DocumentPropertiesW
ImageList_GetImageInfo
SHGetSpecialFolderLocation
DdeSetUserHandle
GetFileVersionInfoSizeW
GetErrorInfo
RegSetValueExW
memcpy
WinHttpGetIEProxyConfigForCurrentUser
GetVersion
GetVersionExW
BCryptGenerateSymmetricKey
SHGetFolderPathW
CryptUnprotectData
gethostbyaddr
OleRegEnumVerbs
Pie
RtlCompressBuffer
__dbk_fcall_wrapper
dbkFCallWrapperAddr
mujq01k6k4zfospx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ