LoadLibraryWHook
RpcStringBindingComposeWHook
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume5/WINDOWS/SECOH-QAD.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume5/WINDOWS/SECOH-QAD.dll
Resource
win10v2004-20230703-en
Target
SECOH-QAD.dll
Size
1KB
MD5
3426b952c8fd5d278e5a37d8330cff29
SHA1
a84a895d299291a12b6c0d65fe5d748b5ed37f03
SHA256
47d168cbf2661152d4fde2be8c37bae61ea22868979d90eb3672c07023499247
SHA512
8f1e00946817792f20958b32abab713a226e669a961651681d45562ee38ba3d3febaa7091b76f08ebc7c6ee740a58c8559d3965d29ae6656b14efb64e657cbc5
Checks for missing Authenticode signature.
resource |
---|
unpack001/Device/HarddiskVolume5/WINDOWS/SECOH-QAD.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcess
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
DisableThreadLibraryCalls
lstrcmpiW
GetModuleHandleA
VirtualProtect
WriteProcessMemory
LoadLibraryWHook
RpcStringBindingComposeWHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ