InitCommonControls
InitCommonControlsEx
Static task
static1
Behavioral task
behavioral1
Sample
TM5.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
TM5.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TM5.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
TM5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
TestMem5.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
TestMem5.url
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
bin/MT0.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
bin/MT0.dll
Resource
win10v2004-20240802-en
Target
TestMem5.7z
Size
37KB
MD5
33b12c4e826bb552b0cfd71278960f42
SHA1
bb10622f460e4c57a3f0c9c459f8bc0f5b1f4903
SHA256
05ffb5bbaa0c2243bf25664049c7aa3615a77bd5036497ef845fc8ed50128c12
SHA512
d543e9e7cfb55996b31f6ec2262b77b5380fcbdb5f1c27908908b9bcfa5c0f43c2dd40ce6bafe0f9a31a7b5d9c817ee74bad464923bef630ba4022f67297346a
SSDEEP
768:QLqHXSn899nWCmaOHQktlL6MRAKX9UJgPkYaLmRihF6gq:QG3S8z7QBFAmUJgPLaLmH
Checks for missing Authenticode signature.
resource |
---|
unpack001/TM5.dll |
unpack001/TM5.exe |
unpack001/bin/MT0.dll |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LsaOpenPolicy
RegCloseKey
RegQueryValueExW
LsaClose
ord380
ord381
ord344
ExtTextOutW
SetBkColor
SetBkMode
SetTextColor
CreateSolidBrush
AllocateUserPhysicalPages
CloseHandle
CreateEventW
CreateFileA
CreateProcessW
CreateThread
DeleteFileA
ExitProcess
ExitThread
FindClose
FindFirstFileExA
FindNextFileA
FindResourceW
FreeUserPhysicalPages
GetCommandLineA
GetCurrentProcessId
GetDurationFormatEx
GetLocalTime
GetLocaleInfoEx
GetModuleFileNameW
GetModuleHandleW
GetNumberFormatEx
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDefaultLangID
GetUserDefaultLangID
GetUserDefaultUILanguage
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapSetInformation
LoadLibraryA
LoadLibraryExW
LoadResource
LockResource
MapUserPhysicalPages
OpenProcess
QueryUnbiasedInterruptTime
ReadFile
SetCurrentDirectoryA
SetEndOfFile
SetEvent
SetFilePointerEx
SetProcessWorkingSetSize
SetThreadExecutionState
SetThreadPriority
Sleep
TerminateThread
VirtualAlloc
VirtualFree
VirtualLock
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
strcpy
RtlGetVersion
_stricmp
_ultow
memcmp
strcat
wcslen
strtol
wcscat
wcscmp
wcscpy
GetWindow
wsprintfW
wsprintfA
TranslateMessage
TranslateAcceleratorW
ShowWindow
SetWindowTextW
SetWindowPlacement
SetWindowLongW
SetUserObjectInformationW
SetTimer
SetParent
AdjustWindowRectEx
AllowSetForegroundWindow
CallWindowProcW
CheckDlgButton
CheckRadioButton
CreateDialogParamW
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextW
EnableWindow
EndDialog
EnumChildWindows
FlashWindowEx
FrameRect
GetActiveWindow
GetDlgCtrlID
GetDlgItem
GetDlgItemTextW
GetFocus
GetMessageW
GetNextDlgTabItem
GetSysColorBrush
GetSystemMetrics
SetDlgItemTextW
GetWindowContextHelpId
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
InvalidateRect
IsChild
IsDialogMessageW
IsDlgButtonChecked
KillTimer
LoadAcceleratorsW
MessageBeep
PostMessageW
PostQuitMessage
ReplyMessage
ScreenToClient
SendDlgItemMessageA
SendDlgItemMessageW
SendInput
SendMessageW
SetDlgItemInt
SetForegroundWindow
InitCommonControls
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
SetPriorityClass
SetThreadPriority
Sleep
TerminateProcess
TerminateThread
VirtualAlloc
ReadFile
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
QueryPerformanceFrequency
QueryPerformanceCounter
SetFilePointer
MapViewOfFile
LoadLibraryA
HeapFree
HeapAlloc
GlobalMemoryStatusEx
GlobalFree
GlobalAlloc
GetVersion
GetUserDefaultLangID
GetTickCount
GetSystemInfo
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
RtlZeroMemory
MultiByteToWideChar
GetLastError
GetFileSize
GetCurrentThread
GetCurrentProcess
GetCompressedFileSizeA
GetCommandLineA
ExitThread
ExitProcess
CreateThread
CreateProcessA
CreateFileMappingA
CreateFileA
VirtualFree
CloseHandle
wsprintfA
SendMessageA
SetWindowTextA
SetWindowPos
SetWindowLongA
SetTimer
SetForegroundWindow
SetDlgItemTextA
GetWindowPlacement
MessageBoxA
LoadIconA
GetWindowRect
GetWindowLongA
GetSysColor
GetDlgItem
GetDlgCtrlID
DialogBoxParamA
InitCommonControls
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapAlloc
HeapFree
MapUserPhysicalPages
QueryPerformanceCounter
QueryPerformanceFrequency
GetProcessWorkingSetSize
SetProcessWorkingSetSize
VirtualAlloc
VirtualFree
VirtualLock
VirtualUnlock
WriteFile
GetProcessHeap
GetLastError
GetCurrentProcess
FreeUserPhysicalPages
CreateFileA
CloseHandle
RtlZeroMemory
AllocateUserPhysicalPages
MessageBoxA
wsprintfA
LsaClose
LookupPrivilegeValueA
GetTokenInformation
AdjustTokenPrivileges
LsaOpenPolicy
OpenProcessToken
LsaAddAccountRights
BlockMove
MemManager
MirrorMove
MirrorMove128
RefreshStable
SimpleTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ