GetModuleHandle64
GetProcAddress64
GetThreadContext64
ReadProcessMemory64
SetLastErrorFromX64Call
SetThreadContext64
VirtualAllocEx64
VirtualFreeEx64
VirtualProtectEx64
VirtualQueryEx64
WriteProcessMemory64
X64Call
Static task
static1
Behavioral task
behavioral1
Sample
9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee.exe
Resource
win10v2004-20241007-en
Target
9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee.exe
Size
557KB
MD5
1fee73457d19578c9dc03a72f944f16e
SHA1
05c5b0d48f8dbbca576063ddf300d41c990f9e58
SHA256
9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee
SHA512
df3abdd991cc6df6f9268a00a795c0dc47d421cfad55ee850d8f36873ac3d3bf8c0cbe54ebb7f1dbd1d19b35c4e3205e0a9dff5295fbd338ffcf4accc4f47bd2
SSDEEP
12288:deZoq5yV8ceQDTjE3FbgZ2OImBxjItKh5FME:wK8c33jEOZdIwxj
Checks for missing Authenticode signature.
resource |
---|
9a29cb7a67e1b38987ba886b673cda3f3c67b75e31ab92710d2cabae66881cee.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenMutexW
GetLastError
OpenEventW
Wow64DisableWow64FsRedirection
ExitProcess
CreateThread
LocalFree
lstrcpyW
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetProcAddress
GetModuleHandleW
lstrlenW
InterlockedDecrement
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleFileNameW
lstrcmpiW
LocalAlloc
lstrcpyA
CloseHandle
LoadLibraryW
DeleteFileW
WriteFile
CreateFileW
CreateDirectoryW
Sleep
GetCommandLineW
VirtualFree
LoadLibraryA
VirtualAlloc
RemoveDirectoryW
WaitForSingleObject
ReadFile
GetFileSize
CreateEventW
SetEvent
ResumeThread
CreateMutexW
lstrlenA
WaitForMultipleObjects
ReleaseMutex
GetModuleHandleA
TerminateThread
GetExitCodeThread
GetNativeSystemInfo
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
VirtualProtect
GetTickCount
GetComputerNameExW
GetUserGeoID
GetCurrentProcessId
GetFileAttributesExW
HeapReAlloc
WriteConsoleW
SetStdHandle
HeapSize
GetStringTypeW
LCMapStringW
FlushFileBuffers
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
wsprintfW
GetAsyncKeyState
wsprintfA
GetForegroundWindow
SetWindowTextW
MessageBoxW
DefWindowProcW
RegisterClassW
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
UnregisterClassW
PostMessageW
CreateWindowExW
CoCreateInstance
VariantClear
VariantInit
SysFreeString
SysAllocString
GetModuleHandle64
GetProcAddress64
GetThreadContext64
ReadProcessMemory64
SetLastErrorFromX64Call
SetThreadContext64
VirtualAllocEx64
VirtualFreeEx64
VirtualProtectEx64
VirtualQueryEx64
WriteProcessMemory64
X64Call
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ