LoadLibraryWHook
RpcStringBindingComposeWHook
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/Windows/SECOH-QAD.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume4/Windows/SECOH-QAD.dll
Resource
win10v2004-20230703-en
Target
SECOH-QAD.dll
Size
1KB
MD5
a24162ff65c20bb3195dcb4885ef5aca
SHA1
e0065dd35e64076c5c010a442be2e6c529fb0b53
SHA256
3a83a77b2a06bb3fe2a6bb59ed9146bee1db3859329ace3cf48ac6e650f6190e
SHA512
407b71f96703661be5de844a1fc0fb867f85ecebde16d643fcc1c01298ff2c6de0fb91df22d21473daa8db607e79644866de5d5c6a35b5e32416f73f7302ed9c
Checks for missing Authenticode signature.
resource |
---|
unpack001/Device/HarddiskVolume4/Windows/SECOH-QAD.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcess
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
DisableThreadLibraryCalls
lstrcmpiW
GetModuleHandleA
VirtualProtect
WriteProcessMemory
LoadLibraryWHook
RpcStringBindingComposeWHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ