s_activate
s_filestream
s_get_expiry
s_get_level
s_get_response
s_get_username
s_init
s_log
s_login
s_registr
s_token
s_var
Static task
static1
Behavioral task
behavioral1
Sample
v2.1.3.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
v2.1.3.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
v2.1.3/Medal.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
v2.1.3/Medal.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
v2.1.3/Sentinal.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
v2.1.3/Sentinal.dll
Resource
win10v2004-20240802-en
Target
v2.1.3.rar
Size
12.3MB
MD5
624c442ee7e5fc8457221244cf11de63
SHA1
9bd84f39b9334daf75bce0cbf46c4a5fec8df188
SHA256
ada56b0341f07442cf71b9ae1f3c7c822e7d2982d47ad20820642ea299ca4014
SHA512
665df596d5d08239a03f3b6ec6eb8bbeb8be7848dbb3cbe8e2fa2a147b0ea2c448c4022303609a27936c4b1522450c1b4cb54d79a345a3fdf3ad5cf4f496a849
SSDEEP
196608:Aafq2r1MdmWYv9R6dkIcUA1x6e7OfUyz7uQgLR6DpG7f/GE2gNcXdZ4WrD5u:AY82ckfV8tfUKtgay/nNujrD5u
Checks for missing Authenticode signature.
resource |
---|
unpack001/v2.1.3/Medal.exe |
unpack001/v2.1.3/Sentinal.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D3D11CreateDeviceAndSwapChain
D3DCompile
GetCurrentProcess
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetWindowRect
CreateSolidBrush
RegSetValueExA
SHGetFolderPathW
?_Winerror_map@std@@YAHH@Z
D3DX11CreateShaderResourceViewFromMemory
RtlInitAnsiString
ImageRvaToVa
ImmSetCompositionWindow
DwmExtendFrameIntoClientArea
__CxxFrameHandler4
memcmp
_callnewh
_configure_narrow_argv
__p__commode
cosf
strtod
_unlock_file
___lc_codepage_func
rand
_stricmp
getenv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
getaddrinfo
ord41
CertFreeCertificateContext
ReportEventW
RegCloseKey
WideCharToMultiByte
GetModuleHandleA
MessageBoxA
DefWindowProcW
ShellExecuteA
SHGetDiskFreeSpaceA
PathFindFileNameA
UnloadUserProfile
RpcStringFreeA
BCryptGenRandom
ImageNtHeader
WinVerifyTrust
s_activate
s_filestream
s_get_expiry
s_get_level
s_get_response
s_get_username
s_init
s_log
s_login
s_registr
s_token
s_var
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE