GetHandleVerifier
IsSandboxedProcess
Static task
static1
Behavioral task
behavioral1
Sample
5353dfa03c763063856c96d3bdc205fa8177d8f93287e10be01a4af55e680a48.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5353dfa03c763063856c96d3bdc205fa8177d8f93287e10be01a4af55e680a48.exe
Resource
win10v2004-20241007-en
Target
5353dfa03c763063856c96d3bdc205fa8177d8f93287e10be01a4af55e680a48
Size
1.4MB
MD5
9fb9c8cad91a0893f47272d3a80e7150
SHA1
d345429fb96b8dfb097649ca11307f2b99050c03
SHA256
5353dfa03c763063856c96d3bdc205fa8177d8f93287e10be01a4af55e680a48
SHA512
1f001269a68d05fa077adf69b112a128749583322d2fd1f90ac92a50f5881a65e34b3d739526c0607663241378a8ca9610d6d87ee46e1b03956685c099ab64a2
SSDEEP
24576:ko3JsiRZxsyB9Wz0eXLbA6WR3Az5MGxe7by1jeVeMzq1:ZsiRZxsyB9Wz0eXLbA61I0je4Mzq
Checks for missing Authenticode signature.
Processes:
resource |
---|
5353dfa03c763063856c96d3bdc205fa8177d8f93287e10be01a4af55e680a48 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SystemFunction036
OpenSCManagerW
OpenServiceW
CloseServiceHandle
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
OpenThreadToken
SetTokenInformation
LookupPrivilegeValueW
CreateRestrictedToken
AdjustTokenPrivileges
CreateProcessAsUserW
SetThreadToken
FreeSid
IsValidSid
GetLengthSid
ConvertStringSidToSidW
ConvertSidToStringSidW
EqualSid
GetAce
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetNamedSecurityInfoW
GetSecurityInfo
SetSecurityInfo
MapGenericMask
AccessCheck
IsValidAcl
InitializeAcl
AddMandatoryAce
BuildTrusteeWithSidW
SetEntriesInAclW
RegCreateKeyExW
RegQueryValueExW
SymFromAddr
SymSetOptions
SymSetSearchPathW
SymInitialize
SymGetSearchPathW
SymCleanup
SymGetLineFromAddr64
RtlCaptureContext
RtlUnwind
RtlUnwindEx
RtlPcToFileHeader
NtWriteFile
RtlNtStatusToDosError
RtlCaptureStackBackTrace
RtlVirtualUnwind
RtlInitUnicodeString
RtlLookupFunctionEntry
NtReadFile
GetErrorInfo
SysStringLen
SysFreeString
SHGetKnownFolderPath
CreateAppContainerProfile
GetUserProfileDirectoryW
DeriveAppContainerSidFromAppContainerName
timeGetTime
AddVectoredExceptionHandler
GetThreadId
GetStartupInfoW
TlsGetValue
GetCurrentProcessId
GetCurrentProcess
CreateRemoteThread
DeleteProcThreadAttributeList
SetThreadStackGuarantee
InitializeProcThreadAttributeList
SwitchToThread
ExitProcess
UpdateProcThreadAttribute
TerminateProcess
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsFree
TlsSetValue
CreateThread
UnhandledExceptionFilter
GetLastError
SetLastError
SetUnhandledExceptionFilter
RaiseException
HeapSetInformation
HeapReAlloc
HeapFree
GetProcessHeaps
HeapDestroy
GetProcessHeap
HeapAlloc
HeapSize
SetThreadErrorMode
GetModuleHandleExW
AddDllDirectory
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
SetDefaultDllDirectories
FreeLibrary
LoadLibraryExW
LoadLibraryExA
GetModuleHandleW
DuplicateHandle
SetHandleInformation
CloseHandle
CreateMutexA
TryAcquireSRWLockExclusive
AcquireSRWLockShared
ReleaseMutex
ReleaseSRWLockExclusive
WaitForSingleObject
ReleaseSRWLockShared
InitializeCriticalSectionAndSpinCount
CreateEventW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
CreateMutexW
SetEvent
WaitForSingleObjectEx
AcquireSRWLockExclusive
GetCommandLineW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetStdHandle
GetEnvironmentVariableW
GetCommandLineA
SetStdHandle
GetCurrentDirectoryW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
ReadConsoleW
AllocConsole
GetConsoleOutputCP
WriteConsoleW
CompareStringW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceFrequency
QueryPerformanceCounter
GetACP
GetUserDefaultLangID
IsValidCodePage
EnumSystemLocalesW
GetCPInfo
LCMapStringEx
GetUserDefaultLCID
FormatMessageW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetOEMCP
GetUserDefaultLocaleName
LoadLibraryA
LoadLibraryW
GetTempPathW
FindFirstFileExW
FlushFileBuffers
SetFilePointerEx
GetLongPathNameW
GetFileAttributesW
GetFileSizeEx
WriteFile
ReadFile
FindNextFileW
CreateFileW
SetFileInformationByHandle
GetFullPathNameW
CreateDirectoryW
GetFileInformationByHandle
GetFileType
FindFirstFileW
FindClose
GetFinalPathNameByHandleW
GetFileInformationByHandleEx
BCryptGenRandom
AttachConsole
CreateIoCompletionPort
PostQueuedCompletionStatus
GetQueuedCompletionStatus
SetInformationJobObject
CreateJobObjectW
EnumSystemLocalesEx
GetSystemTimeAsFileTime
GetLocalTime
GetVersionExW
GetTickCount
RegisterWaitForSingleObject
UnregisterWaitEx
SleepConditionVariableSRW
Sleep
WakeAllConditionVariable
IsDebuggerPresent
DebugBreak
OutputDebugStringA
SetThreadInformation
CreateFileMappingW
VirtualAllocEx
VirtualFree
MapViewOfFile
VirtualProtectEx
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
UnmapViewOfFile
IsProcessorFeaturePresent
GetProcessHandleCount
GetCurrentProcessorNumber
GetProcessMitigationPolicy
SetProcessMitigationPolicy
GetProductInfo
GetNativeSystemInfo
IsWow64Process
SetThreadAffinityMask
LocalFree
GetUserObjectInformationW
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
CreateWindowStationW
GetProcessWindowStation
CloseWindowStation
CloseDesktop
MessageBoxA
TerminateJobObject
QueryInformationJobObject
QueryDosDeviceW
InitializeSListHead
DecodePointer
EncodePointer
FlsAlloc
FlsSetValue
FlsFree
FlsGetValue
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ