LoadLibraryWHook
RpcStringBindingComposeWHook
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/Windows/SECOH-QAD.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume4/Windows/SECOH-QAD.dll
Resource
win10v2004-20230703-en
Target
SECOH-QAD.dll
Size
1KB
MD5
c2e474bf7c5d6f29eee942c6f5571aca
SHA1
eea4e440c4877cb6e9cc9ba63f508e667c280d7b
SHA256
d9d480fc9124f8234ad3d59f5b8c0516159188ff45c7a06460569b4f01aacc49
SHA512
0666c347375cfeb43463c66562cd6211f4e6190bed025ee556553ed2dd445375ca4abae95a9d8de4c3af21df4d95b3c063628a1f1a06dced3b5a19ca678d7ae1
Checks for missing Authenticode signature.
resource |
---|
unpack001/Device/HarddiskVolume4/Windows/SECOH-QAD.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcess
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
DisableThreadLibraryCalls
lstrcmpiW
GetModuleHandleA
VirtualProtect
WriteProcessMemory
LoadLibraryWHook
RpcStringBindingComposeWHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ