__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
NCK_MTKExploitTool.exe
Resource
win11-20240802-en
Target
NCK_MTKExploitTool.exe
Size
28.7MB
MD5
11cacaae312c7ac422f2c1b92db8198e
SHA1
29a6f2bd4ca41adae01907d49b31effdf604bf60
SHA256
6eea2dd62784ed89168684f299090900d27f4258fcea8650741fe3e1f6b2c640
SHA512
2eda97ef2cfa9b5b50c5089dc6b570e14e4329508092f570c3cd92bd9b104fd0632ed739dbb05d6a4f73fbbb51bda2350400b540d822e87a3fa4ea10b75e025f
SSDEEP
786432:sngJLV91ilFPMXgULCWaroO03sngCwClH2C:sop91ilpsbLC/rHOqd
Checks for missing Authenticode signature.
resource |
---|
NCK_MTKExploitTool.exe |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DocumentPropertiesW
GetSaveFileNameW
ImageList_GetImageInfo
Shell_NotifyIconW
MoveWindow
GetFileVersionInfoSizeW
GetErrorInfo
RegSetValueExW
memcpy
usb_close
GetVersion
GetVersionExW
IsEqualGUID
Pie
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ