TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
Static task
static1
Behavioral task
behavioral1
Sample
740deacaf5a6e5306aedc99da210d743d1bc1a11778fd7581fbd8cc6766557cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
740deacaf5a6e5306aedc99da210d743d1bc1a11778fd7581fbd8cc6766557cc.exe
Resource
win10v2004-20240802-en
Target
740deacaf5a6e5306aedc99da210d743d1bc1a11778fd7581fbd8cc6766557cc
Size
4.0MB
MD5
badf72e7868891146f36e732b5304f1b
SHA1
883ae64e136c7978d5f5f177a3d699337f0da9e7
SHA256
740deacaf5a6e5306aedc99da210d743d1bc1a11778fd7581fbd8cc6766557cc
SHA512
eefa341c78fd580ad9d68e3ffabfdeb3cae21f3798ebaba501cacb0cb4e10bccbbd9cc63d1a95aeb8858f07d4a66cb3f366fb99b88684de20a31f0f31f0d7237
SSDEEP
98304:kN0/ZROthHKLf5J6YF2uHCozP3Zf1PGSH63Q6Yjo/9:kN0vhLfa02uHCozP31N77e/9
Checks for missing Authenticode signature.
resource |
---|
740deacaf5a6e5306aedc99da210d743d1bc1a11778fd7581fbd8cc6766557cc |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
StrRetToBufW
VerQueryValueW
GetDC
GetProcessImageFileNameW
VariantInit
FreeSid
_gcvt
RasEnumConnectionsW
WinHttpOpen
sqlite3_free
bind
Pie
WNetGetConnectionW
timeGetTime
InternetOpenW
PrintDlgW
ImageList_Add
SHGetMalloc
WJSOpen
OleDraw
GetIfEntry
NtDeleteFile
SetSuspendState
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE