TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
62cfddd03023a777626b82cd7143dae6f4af055f71f9572704d3d120980252d3N.exe
Resource
win7-20240903-en
Target
62cfddd03023a777626b82cd7143dae6f4af055f71f9572704d3d120980252d3N.exe
Size
3.1MB
MD5
119652b5703875dce6ca31e13c5c7580
SHA1
2e3b50184e5905b606b6e0ada46777889d55dba9
SHA256
62cfddd03023a777626b82cd7143dae6f4af055f71f9572704d3d120980252d3
SHA512
5273df782d91ab104b47825f8801238fd8a27cdcbbd39ac8c784762e33b29353611bb6ca279bbcb47705f369984ad92d116e83ebf7728e3e73d77368ec8fe3a2
SSDEEP
49152:qo7VF4WL9bZ9VfvauSAtmjnvVEEDRr3X85oJn/IM7s0Ic6:qo7NLBZ7faB3X85o5/M08
Checks for missing Authenticode signature.
resource |
---|
62cfddd03023a777626b82cd7143dae6f4af055f71f9572704d3d120980252d3N.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetACP
CloseHandle
LocalFree
VirtualProtect
GetTickCount
VirtualFree
GetStartupInfoW
ExitProcess
SetCurrentDirectoryW
GetCurrentDirectoryW
InitializeCriticalSection
VirtualAlloc
RtlUnwind
GetCommandLineW
GetSystemInfo
GetProcAddress
GetStdHandle
GetModuleHandleW
FreeLibrary
FindFirstFileW
GetLastError
GetModuleFileNameW
lstrlenW
QueryPerformanceCounter
CompareStringW
CreateThread
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryA
CreateMutexW
GetVersion
RaiseException
SwitchToThread
GetEnvironmentVariableW
WriteFile
LocalFileTimeToFileTime
ExitThread
DeleteCriticalSection
TlsGetValue
TlsSetValue
LoadLibraryExW
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
Sleep
SetThreadLocale
DocumentPropertiesW
ClosePrinter
OpenPrinterW
GetDefaultPrinterW
EnumPrintersW
GetSaveFileNameW
GetOpenFileNameW
InitCommonControls
SHBrowseForFolderW
ExtractIconW
SHGetMalloc
SHGetFileInfoW
SHChangeNotify
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListW
ShellExecuteExW
CoCreateInstance
CLSIDFromString
CoUninitialize
IsEqualGUID
OleInitialize
CoFreeUnusedLibraries
CLSIDFromProgID
OleUninitialize
CoDisconnectObject
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
StringFromCLSID
CreateWindowExW
DrawTextW
GetMonitorInfoW
EnumDisplayMonitors
MonitorFromRect
SystemParametersInfoW
MonitorFromPoint
MonitorFromWindow
ScrollWindowEx
SendMessageTimeoutW
CharNextW
LoadStringW
LoadCursorW
SafeArrayPutElement
LoadTypeLib
GetErrorInfo
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
SafeArrayCreate
SafeArrayGetElement
GetActiveObject
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
RegisterTypeLib
VariantChangeType
VariantCopyInd
RegQueryValueExW
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
GetTextExtentPoint32W
EnumFontsW
ExtTextOutW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE