_jhY6e2
WoyxpMfWUsqjL
_Amy5Cmu7CZfR1K@4
_NwuBK9wgmte@8
9wrFWUKDg
_qO_Y4dfzz6Ccj2
_WIj8jLm_wlxovJ@20
_2IemZGq8wuQ@20
_CzAvM8IdKUHkxA@12
A_kLE1tCY4yN6
_htVnEXZpyZwsp
Jdq7pX3bUJ
hzy1jEP@24
6AuFipDYIKA@12
_Bwn2BjGDGR
_KE3GQXlLGa
GiWy0hxbO
_N4qDKOg
Static task
static1
Behavioral task
behavioral1
Sample
98183cc1db8260322cde8d29f83c10655e3c268a824fdd7e545f5095ee8ffa3e.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98183cc1db8260322cde8d29f83c10655e3c268a824fdd7e545f5095ee8ffa3e.dll
Resource
win10v2004-20240802-en
Target
98183cc1db8260322cde8d29f83c10655e3c268a824fdd7e545f5095ee8ffa3e
Size
169KB
MD5
de6ac087eebb4de29dcaff69c0e5971f
SHA1
8bd00427600588a13dc3592daf4d895b3e3b7c9d
SHA256
98183cc1db8260322cde8d29f83c10655e3c268a824fdd7e545f5095ee8ffa3e
SHA512
d4a06913b435ead428849555ac7b99ab5838edb54100ee618833427eb0270715a586d87c6f44d33562de63308d327cec678ffae9ec0126b4f8f7387c3684d94b
SSDEEP
3072:KpoEzBPEb+k3OycKHCx8qAIi7p61jY2aV1DFGAJ7W8VeUh:HEzBsb+sBCvAIC81Hy8Ag
Checks for missing Authenticode signature.
resource |
---|
98183cc1db8260322cde8d29f83c10655e3c268a824fdd7e545f5095ee8ffa3e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
LoadLibraryA
GetProcessHeap
LoadLibraryExA
RaiseException
VirtualAlloc
ExitProcess
GetBkColor
SaveDC
CreatePenIndirect
GetBkMode
TranslateMessage
UnhookWindowsHookEx
IsMenu
UnregisterClassA
GetMenu
CharLowerA
WaitMessage
FindTextA
GetSaveFileNameA
ChooseColorA
_jhY6e2
WoyxpMfWUsqjL
_Amy5Cmu7CZfR1K@4
_NwuBK9wgmte@8
9wrFWUKDg
_qO_Y4dfzz6Ccj2
_WIj8jLm_wlxovJ@20
_2IemZGq8wuQ@20
_CzAvM8IdKUHkxA@12
A_kLE1tCY4yN6
_htVnEXZpyZwsp
Jdq7pX3bUJ
hzy1jEP@24
6AuFipDYIKA@12
_Bwn2BjGDGR
_KE3GQXlLGa
GiWy0hxbO
_N4qDKOg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ