InstallHook
LdrInjectDll
StartInjectDingTalk
StartInjectQQOnX86
UnistallHook
Static task
static1
Behavioral task
behavioral1
Sample
e270aba007b9207b3039184c8752a1d5c8e62f87b1d99e85c36d884876fe3683.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e270aba007b9207b3039184c8752a1d5c8e62f87b1d99e85c36d884876fe3683.dll
Resource
win10v2004-20230220-en
Target
e270aba007b9207b3039184c8752a1d5c8e62f87b1d99e85c36d884876fe3683
Size
547KB
MD5
8f6e40c7a8e09a8f20c5b3743aa89630
SHA1
a917b64b7554de35ad0acf8d171a06277f34182e
SHA256
e270aba007b9207b3039184c8752a1d5c8e62f87b1d99e85c36d884876fe3683
SHA512
c3b71b2e90b62fb5db7be73d89132914b56b66ae748488050cdf28a5a110525e6d8803156062954abfdbb0193e35bb91f5389bea0e14b2c06f1b7abdce9a99fd
SSDEEP
12288:FbQXVftPmwiVUtYsdqVzRuWVhyxMeAAKFvrcOKBsCpH8cNT4Ovew1sUcVbLg:FygpVZIbA/FRnCpBNT47w1sFVbLg
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualQuery
GetCurrentProcess
InterlockedCompareExchange
GetCurrentThread
VirtualFree
FlushInstructionCache
VirtualAlloc
VirtualProtect
GetCurrentThreadId
SuspendThread
FreeLibrary
Module32FirstW
CreateToolhelp32Snapshot
Module32NextW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
GetVersionExA
TlsAlloc
TlsFree
CopyFileExW
ReplaceFileW
MoveFileWithProgressW
CreateRemoteThread
VirtualFreeEx
lstrlenW
GetExitCodeThread
OutputDebugStringA
TlsGetValue
TlsSetValue
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
Thread32First
LoadLibraryW
Thread32Next
Process32FirstW
Process32NextW
OpenEventW
SleepEx
QueueUserAPC
SetEndOfFile
WaitForSingleObjectEx
CancelIo
DeviceIoControl
QueryDosDeviceW
RemoveDirectoryW
LocalAlloc
FindClose
lstrcpynW
GetVersionExW
FindFirstFileW
WritePrivateProfileStringA
GetPrivateProfileStringA
SetFileAttributesA
CreateDirectoryA
OpenProcess
SetThreadContext
CreateProcessW
SetFileAttributesW
DeleteFileW
CreateEventW
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GetFileAttributesW
GlobalAlloc
GlobalLock
GetProcAddress
GetModuleHandleW
ExitProcess
GetModuleFileNameW
CreateFileA
GetLastError
CreateFileW
ReadFile
SetFilePointer
GetThreadContext
ResumeThread
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
SetLastError
GetCurrentProcessId
CloseHandle
ReleaseMutex
GetFileAttributesExW
GetFileSizeEx
CreateEventA
Sleep
TerminateThread
WriteFile
GetTickCount
GetVolumeInformationA
GetDriveTypeA
GetProcessHeap
HeapFree
HeapAlloc
WriteConsoleW
FlushFileBuffers
HeapReAlloc
GetLogicalDrives
GetDriveTypeW
GetModuleFileNameA
LocalFree
ProcessIdToSessionId
OpenMutexW
GetStartupInfoW
GetSystemDirectoryW
GetLocalTime
SetEvent
WaitForSingleObject
SetFilePointerEx
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
MoveFileExW
HeapDestroy
HeapCreate
GetConsoleMode
GetConsoleCP
SetStdHandle
LCMapStringW
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetStdHandle
VirtualQueryEx
TerminateProcess
CreateMutexW
SetHandleCount
HeapSize
IsProcessorFeaturePresent
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateThread
ExitThread
RaiseException
GetCommandLineA
GetFileType
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetSystemDirectoryA
FindNextFileW
GetAsyncKeyState
GetMenuItemCount
GetMenuItemInfoW
EnumThreadWindows
IsWindowVisible
PostMessageW
mouse_event
SendMessageW
GetSystemMetrics
ReleaseDC
GetDC
FillRect
GetWindowDC
CreateWindowExW
EnumChildWindows
GetClassNameW
GetWindowTextW
SetClipboardData
CountClipboardFormats
OpenClipboard
EmptyClipboard
GetClipboardData
EnumClipboardFormats
IsClipboardFormatAvailable
GetPriorityClipboardFormat
CloseClipboard
GetWindowThreadProcessId
GetCursorPos
WindowFromPoint
GetWindowLongW
GetParent
UpdateWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyNameTextW
DispatchMessageA
IsWindow
DefWindowProcA
CreateWindowExA
TrackPopupMenu
LoadIconW
TranslateMessage
CallNextHookEx
LoadCursorW
GetKeyState
PostQuitMessage
RegisterClassExA
GetMessageW
SetMenuItemInfoW
EnableMenuItem
InsertMenuItemW
CreateDialogParamW
wsprintfW
wsprintfA
CharUpperW
EndPage
BitBlt
StretchBlt
GetStockObject
StartPage
StartDocW
EndDoc
OpenPrinterW
StartDocPrinterW
StartPagePrinter
ClosePrinter
EndDocPrinter
ConvertSidToStringSidW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExA
OpenProcessToken
ConvertSidToStringSidA
GetTokenInformation
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
SHCreateDirectoryExW
SHFileOperationW
SHGetSpecialFolderPathW
SHCreateDirectoryExA
DragQueryFileW
CommandLineToArgvW
ShellExecuteExW
CoCreateGuid
OleGetClipboard
CoCreateInstance
DoDragDrop
ReleaseStgMedium
CoTaskMemFree
PathFileExistsW
wnsprintfA
wnsprintfW
PathIsNetworkPathW
PathFindFileNameW
StrStrIW
SHGetValueW
PathAppendW
ord219
wvnsprintfA
PathMatchSpecW
StrStrW
PathFileExistsA
SHSetValueA
SHSetValueW
StrCmpIW
SHDeleteValueA
PathAppendA
SHEnumValueA
PathAddBackslashW
StrToIntExA
PathFindFileNameA
connect
htons
inet_addr
WSASocketW
WSAGetLastError
closesocket
WSASend
WSARecv
socket
WSAGetOverlappedResult
GetAdaptersAddresses
Netbios
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
GetModuleFileNameExW
EnumProcesses
InstallHook
LdrInjectDll
StartInjectDingTalk
StartInjectQQOnX86
UnistallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ