_MainWndProc@16
_StubFileWrite@12
Static task
static1
Behavioral task
behavioral1
Sample
a25371cf9d1183570ca79b7171c6a620N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a25371cf9d1183570ca79b7171c6a620N.exe
Resource
win10v2004-20240802-en
Target
a25371cf9d1183570ca79b7171c6a620N.exe
Size
987KB
MD5
a25371cf9d1183570ca79b7171c6a620
SHA1
b3c779713f3caf64a09aaff7182839cf5e0a218c
SHA256
ddc9906c2ddc1029815059efa1366e697c5a15641a169ff5960c5bec22624a4c
SHA512
6e146c6b9da75359dafc20f2b7ae7f2eb0bf7dd176ee97ccfe6a4796c2a152b9d0185d93ba58ead5e73e09a93abbec6f5abaed08815e94275c0a0dc187fdf5ab
SSDEEP
24576:xZaT65DP44Gw/KdF7p2TCYdHs0m2MGX6SZT:xlDnhH2Yds2xX6Sp
Checks for missing Authenticode signature.
resource |
---|
a25371cf9d1183570ca79b7171c6a620N.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
lstrcpyA
GetCommandLineA
SetErrorMode
lstrlenA
MulDiv
GetTempFileNameA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FormatMessageA
lstrcatA
GetLastError
_lwrite
_llseek
GlobalUnlock
_lopen
GlobalAlloc
GlobalFree
_lclose
_lcreat
LoadLibraryA
GetProcAddress
FreeLibrary
OpenFile
GetVersionExA
GetCurrentProcess
WinExec
ExitProcess
_lread
LocalFree
GetTempPathA
GlobalLock
GetDC
BeginPaint
EndPaint
InvalidateRect
PostQuitMessage
SendMessageA
DefWindowProcA
GetClientRect
CreateWindowExA
DrawTextA
ReleaseDC
SetWindowPos
ShowWindow
UpdateWindow
SetTimer
LoadIconA
wsprintfA
MessageBoxA
ExitWindowsEx
RegisterClassA
LoadCursorA
DeleteObject
GetStockObject
GetDeviceCaps
PatBlt
CreateSolidBrush
TextOutA
SetTextColor
SetBkMode
SelectObject
StretchDIBits
CreateFontA
RealizePalette
SelectPalette
CreatePalette
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ