?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
Static task
static1
Behavioral task
behavioral1
Sample
7a993d54df019f3257808375b424d8409c731dc1587b06e251c2a70b279bf7f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7a993d54df019f3257808375b424d8409c731dc1587b06e251c2a70b279bf7f6.exe
Resource
win10v2004-20241007-en
Target
7a993d54df019f3257808375b424d8409c731dc1587b06e251c2a70b279bf7f6
Size
65KB
MD5
29110df3b8f4ad5d8cc997f4f557f8f0
SHA1
4825f66f03cb8b4790b2719dba2ce120688982a8
SHA256
7a993d54df019f3257808375b424d8409c731dc1587b06e251c2a70b279bf7f6
SHA512
cf5fc8f1f1e2fe3deda346f4a8ee192129d3c35c40625cef8d6247b4cd4c17ba5e631ff63ab95d7aa26ac8661452872acfe4ece1588e034007d8177116fc166b
SSDEEP
1536:rnwCjE/ms/PFrCwzs6yOwo5WG9KPX2LgGKXLY5o:rwCja7PdCwzDyW5WgKPXSBK7Y6
Checks for missing Authenticode signature.
resource |
---|
7a993d54df019f3257808375b424d8409c731dc1587b06e251c2a70b279bf7f6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetClassLongA
LoadBitmapA
IsMenu
GetProcessWindowStation
IsCharLowerA
GetActiveWindow
PathGetDriveNumberW
PathIsRootW
UrlCompareA
StrCmpLogicalW
PathIsSameRootA
UrlGetPartA
StrStrIW
PathGetCharTypeW
ChrCmpIW
StrToIntA
ord29
StrPBrkA
lstrcatA
?LormDelete@@YGXUverifyEw@CA7
?LormSelect@@YGXUverifyEw@CA7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ