TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
c0cee9beea6b1c1365c1f3dd61a1de9e42def1bdf13557dc9473c232717faf39.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0cee9beea6b1c1365c1f3dd61a1de9e42def1bdf13557dc9473c232717faf39.exe
Resource
win10v2004-20240802-en
Target
c0cee9beea6b1c1365c1f3dd61a1de9e42def1bdf13557dc9473c232717faf39
Size
3.6MB
MD5
a42824c5a7cd1d81aa518339021ebbda
SHA1
e0997449b19edabd6ac130bfdea528b9526be3f7
SHA256
c0cee9beea6b1c1365c1f3dd61a1de9e42def1bdf13557dc9473c232717faf39
SHA512
a9456520d08da7094e5bc3eb35b0e2a3425c8443654850fe3576d65ae4dff4da27501c65d79f47999db2a1aca08a6abde029d6a0022aa0d82e721896908d9ece
SSDEEP
98304:rDym/eelxF/T1Sa+UPSoqlEBaxHrDKXNA0u5NEw:amGelP/Ua+Ur4qw/KdfmNZ
Checks for missing Authenticode signature.
resource |
---|
c0cee9beea6b1c1365c1f3dd61a1de9e42def1bdf13557dc9473c232717faf39 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SetFileAttributesW
SetFileTime
QueryDosDeviceW
GetACP
CloseHandle
LocalFree
SizeofResource
VirtualProtect
FindNextFileW
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
GetStdHandle
FileTimeToLocalFileTime
GetModuleHandleW
FreeLibrary
HeapDestroy
FileTimeToDosDateTime
ReadFile
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
MapViewOfFile
LoadLibraryA
ResetEvent
GetVolumeInformationW
FreeResource
GetVersion
GetDriveTypeW
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
GetLogicalDrives
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetTempFileNameW
GetFileSize
GetStartupInfoW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
GetSystemInfo
GetCommandLineW
GetTempPathW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetLogicalDriveStringsW
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetWindowsDirectoryW
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
UnmapViewOfFile
lstrlenW
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
SystemTimeToFileTime
DeleteFileW
GetLocalTime
WaitForSingleObject
WriteFile
CreateFileMappingW
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
TzSpecificLocalTimeToSystemTime
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
SetThreadLocale
GetThreadLocale
ShellExecuteW
ShellExecuteExW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CharUpperBuffW
CharNextW
MsgWaitForMultipleObjects
WaitForInputIdle
CharLowerBuffW
LoadStringW
CharUpperW
PeekMessageW
GetActiveWindow
GetSystemMetrics
MessageBoxW
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
memcpy
memset
NetWkstaGetInfo
NetApiBufferFree
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ