TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
Static task
static1
Behavioral task
behavioral1
Sample
adec3128416bd743412a3e26c887c643413ad053d612a48486f5929e7ad0aca9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adec3128416bd743412a3e26c887c643413ad053d612a48486f5929e7ad0aca9.exe
Resource
win10v2004-20240802-en
Target
adec3128416bd743412a3e26c887c643413ad053d612a48486f5929e7ad0aca9
Size
4.0MB
MD5
222107a3e37e1736bf3bee9c24e8fc35
SHA1
b149f79402b3911e607fe0a92b0eef24075fedc8
SHA256
adec3128416bd743412a3e26c887c643413ad053d612a48486f5929e7ad0aca9
SHA512
496822c79956197288b5de6454f348b8e2043172e85beb7d55a3b9dad4fd86dce976ec0bd7ffedfffb7bdebe4e30d4ce9c6047b024a4fde9a993a024f07430e1
SSDEEP
98304:0ZWqtFIlEl9lCw+hLx0px3SMRRWMbNiYltG:0ZPFIl+7CwuLx07iGpiYl0
Checks for missing Authenticode signature.
resource |
---|
adec3128416bd743412a3e26c887c643413ad053d612a48486f5929e7ad0aca9 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
StrRetToBufW
VerQueryValueW
GetDC
GetProcessImageFileNameW
VariantInit
FreeSid
_gcvt
RasEnumConnectionsW
WinHttpOpen
sqlite3_free
bind
Pie
WNetGetConnectionW
timeGetTime
InternetOpenW
PrintDlgW
ImageList_Add
SHGetMalloc
WJSOpen
OleDraw
GetIfEntry
NtDeleteFile
SetSuspendState
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE