LoadLibraryWHook
RpcStringBindingComposeWHook
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/Windows/SECOH-QAD.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume4/Windows/SECOH-QAD.dll
Resource
win10v2004-20230703-en
Target
SECOH-QAD.dll
Size
1KB
MD5
018bb2d54cdaa6abb736c5717c995df0
SHA1
4d23c1cb6b1e38b484b55a99729c860205b728c5
SHA256
aedc47ef6766e162a5d76d9427719e4d3c557c99493a68686b32baa0918f21bc
SHA512
a8efb7360082748ca6b3a8debe413cb078788b07059859e6f9dd7fbb3a74bb9de1c27c4779ce0b313f956bf2248e0eaba5cfde2b1ab74c082b1b8b9e649cc39b
Checks for missing Authenticode signature.
resource |
---|
unpack001/Device/HarddiskVolume4/Windows/SECOH-QAD.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcess
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
DisableThreadLibraryCalls
lstrcmpiW
GetModuleHandleA
VirtualProtect
WriteProcessMemory
LoadLibraryWHook
RpcStringBindingComposeWHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ