Main
Save
Behavioral task
behavioral1
Sample
61c9087a7bd89e6c7b25399f7dcaa95c27f1ede854a79aa47729b4f777d8bb8c.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
61c9087a7bd89e6c7b25399f7dcaa95c27f1ede854a79aa47729b4f777d8bb8c.dll
Resource
win11-20240802-en
Target
61c9087a7bd89e6c7b25399f7dcaa95c27f1ede854a79aa47729b4f777d8bb8c
Size
1.0MB
MD5
e4b1979dd4d6f2bf3d6668506ffe80e6
SHA1
b75727a1d133679666366919993e6ec67eab6dbe
SHA256
61c9087a7bd89e6c7b25399f7dcaa95c27f1ede854a79aa47729b4f777d8bb8c
SHA512
bcaf8f3214975a7cbbdb7a29a0eedbab5a19b66161b823b9c0c7560af53458f22b2aed258f9bf58e060fd347c5f1daad8f8aa0f0b00d89f33355fb7a8f4d322f
SSDEEP
24576:mmHdWn/tHJ6V/b+nygNPoPOzmyt0z8n+C3gl6dy/nJQ+bO3q3C:UobUKtbOa3C
amadey
4.14
1217b4
http://80.66.75.214
b61005b96341462d6594a250eaee522a
/g8djmsaxA/index.php
Checks for missing Authenticode signature.
resource |
---|
61c9087a7bd89e6c7b25399f7dcaa95c27f1ede854a79aa47729b4f777d8bb8c |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CryptUnprotectData
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
MultiByteToWideChar
Sleep
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
DeleteFileA
DeleteFileW
HeapReAlloc
CloseHandle
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
GetProcAddress
CreateFileMappingA
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
SetHandleInformation
FindFirstFileA
Wow64DisableWow64FsRedirection
K32GetModuleFileNameExW
FindNextFileA
CreatePipe
PeekNamedPipe
lstrlenA
FindClose
GetCurrentDirectoryA
lstrcatA
OpenProcess
SetCurrentDirectoryA
CreateToolhelp32Snapshot
ProcessIdToSessionId
CopyFileA
Wow64RevertWow64FsRedirection
Process32NextW
Process32FirstW
CreateThread
CreateProcessA
CreateDirectoryA
ReadConsoleW
InitializeCriticalSection
LeaveCriticalSection
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
GetFullPathNameW
EnterCriticalSection
HeapFree
HeapCreate
TryEnterCriticalSection
ReadFile
AreFileApisANSI
SetFilePointer
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetStdHandle
GetCurrentDirectoryW
GetStdHandle
GetTimeZoneInformation
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InitializeSListHead
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
RaiseException
InterlockedFlushSList
RtlUnwind
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetModuleFileNameW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
GetUserNameA
RegEnumValueW
RegEnumKeyA
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyA
RegQueryValueExA
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExA
RegEnumKeyExW
LookupAccountNameA
GetSidIdentifierAuthority
SHFileOperationA
SHGetFolderPathA
HttpOpenRequestA
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
HttpSendRequestExW
HttpEndRequestA
InternetOpenW
InternetWriteFile
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptGenerateSymmetricKey
BCryptDecrypt
Main
Save
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ