Static task
static1
Behavioral task
behavioral1
Sample
ssapihook.dll
Resource
win10v2004-20230220-en
General
-
Target
ssapihook.dll
-
Size
67KB
-
MD5
4d9943a0adc1a3bd1472bdbab649a436
-
SHA1
f0f36e014a71e21e629cabaa835f39a4e775e092
-
SHA256
87dd71ac71bca50d9f1179215bbc4a25783c6a959def5c1850683eb41f6b0322
-
SHA512
21766452cd53a2344c321b042984a08bcb46dac5e2b06dcd25f1a740e4018cb0f90d39b95414febd76d4c1447efc0dcae6dfa1ee176fdfab654a4efd2e705492
-
SSDEEP
768:Au0C1rRehNQtzs9BAniDsy2cY4YA0jZDz4raKt5K/txh9/:6EsCiDnjY4YA0jZDz4rzt+h9/
Malware Config
Signatures
Files
-
ssapihook.dll.dll windows x64
7bdc60264d3b659460349628d2756187
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GlobalAddAtomW
InitializeCriticalSection
TlsAlloc
LocalFree
TlsGetValue
GetProcAddress
LoadLibraryW
GetCurrentThreadId
TlsSetValue
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
VirtualAlloc
VirtualQuery
TlsFree
VirtualFree
CloseHandle
GetThreadContext
Sleep
ResumeThread
SuspendThread
OpenThread
SetThreadPriority
GetThreadPriority
GetCurrentThread
GetCurrentProcessId
FlushInstructionCache
VirtualProtectEx
GetCurrentProcess
GlobalDeleteAtom
GetSystemInfo
DeleteCriticalSection
user32
UnhookWindowsHookEx
CallNextHookEx
GetPropW
PostMessageW
SendMessageW
FillRect
SetWindowsHookExW
SetPropW
RemovePropW
GetSystemMetrics
gdi32
CreateSolidBrush
DeleteObject
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ