Exec
ExecToLog
ExecToStack
Static task
static1
Behavioral task
behavioral1
Sample
ed7acfe4bd5e3b69d15a2d06c6f89cf30af062a021b556e7355ea705d90a6864.dll
Resource
win7-20240903-en
Target
ed7acfe4bd5e3b69d15a2d06c6f89cf30af062a021b556e7355ea705d90a6864.exe
Size
115KB
MD5
7767c61e303b47a3c5a0b059d666b61d
SHA1
65eed0f23f922f93f9813f3b8584fbbdd8137831
SHA256
ed7acfe4bd5e3b69d15a2d06c6f89cf30af062a021b556e7355ea705d90a6864
SHA512
7ae3d7567506a2b563962f2b1555c99ca5c013d1bbed256e4f261f7b4f7a372c1d68d8b6c1b0ac671d148c41e32566e1eaef5fb159f1e00476af57711dc2f4ed
SSDEEP
3072:nfo79dM9i3Kff/immNiwXFNxyJdZVkw8pMYecSdknQTSEPh:nfo7HM9iafHJmNiwXFGdnxDxbZh
Checks for missing Authenticode signature.
resource |
---|
ed7acfe4bd5e3b69d15a2d06c6f89cf30af062a021b556e7355ea705d90a6864.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetExitCodeProcess
WaitForSingleObject
Sleep
TerminateProcess
lstrcpyA
lstrcpynA
GlobalReAlloc
GlobalUnlock
GlobalSize
ReadFile
PeekNamedPipe
GetTickCount
CreateProcessA
GetStartupInfoA
CreatePipe
GetVersionExA
GetModuleHandleA
DeleteFileA
lstrcmpiA
lstrlenA
lstrcatA
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CopyFileA
GetTempFileNameA
GlobalFree
GlobalAlloc
GetModuleFileNameA
ExitProcess
GetCommandLineA
GetProcAddress
GlobalLock
GetCurrentProcess
SendMessageA
OemToCharBuffA
CharNextA
wsprintfA
CharPrevA
FindWindowExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE