InputFile
InvCMAP
PrintFile
Static task
static1
Behavioral task
behavioral1
Sample
93e7438a26ee61849414dde38e01ada0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93e7438a26ee61849414dde38e01ada0N.dll
Resource
win10v2004-20240802-en
Target
93e7438a26ee61849414dde38e01ada0N.exe
Size
168KB
MD5
93e7438a26ee61849414dde38e01ada0
SHA1
40e0f2e36b981e14ff71bb11208aa4c9b6952f0e
SHA256
bc755508d74fc6fad6e789579249ca7847e403b6eba56b745a978fd3c2b894c8
SHA512
7158cc1d34668728fef02c501fd6490058b5adbacef2694f0d2441d46dcf9aaeef24618b90d739e3ed8a54181c5c9ccd1a6a5cfe8fea4b16e0e60aebc12ba63c
SSDEEP
3072:S7V3SNXUq1/6D9sqWccAkxZbd3KScuk+pxEodfSBaMKslWz:S7eX/1wSSyxd5lJpVdfSBaMKCm
Checks for missing Authenticode signature.
resource |
---|
93e7438a26ee61849414dde38e01ada0N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord825
ord389
ord6059
ord3229
ord5204
ord5808
ord1988
ord500
ord772
ord540
ord800
ord5356
ord690
ord823
strchr
strncpy
sscanf
_EH_prolog
__CxxFrameHandler
wcscat
memcpy
malloc
free
strcpy
srand
memcmp
strrchr
strcat
time
localtime
strftime
vsprintf
sprintf
strlen
memset
rand
atoi
strcspn
strstr
_CxxThrowException
tolower
toupper
strcmp
_strcmpi
wcslen
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
FormatMessageA
CreateProcessA
GetLocalTime
lstrcatA
DeviceIoControl
LocalFree
InterlockedIncrement
InterlockedExchange
CreateMutexA
GetLastError
WinExec
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
ReadFile
GetFileSize
InterlockedDecrement
GetSystemInfo
WriteProcessMemory
CreateDirectoryA
ReadProcessMemory
VirtualQueryEx
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
MultiByteToWideChar
GetSystemDirectoryA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
wsprintfA
GetDesktopWindow
LookupPrivilegeValueA
RegQueryInfoKeyA
RegEnumValueA
AdjustTokenPrivileges
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
WSACleanup
htons
closesocket
htonl
sendto
send
__WSAFDIsSet
recv
connect
setsockopt
WSAIoctl
WSAStartup
socket
ntohs
inet_addr
bind
ioctlsocket
select
recvfrom
WSAGetLastError
PathIsDirectoryA
PathFileExistsA
StrStrIA
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
SafeArrayGetVartype
SafeArrayAccessData
SafeArrayUnaccessData
VariantChangeType
SysStringLen
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocString
VariantClear
SysAllocStringByteLen
VariantInit
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Netbios
InputFile
InvCMAP
PrintFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ