DllInstall
DllRegisterServer
DllUninstall
DllUnregisterServer
Think
Static task
static1
Behavioral task
behavioral1
Sample
0517_ThreadlessHooker_rc_x64.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0517_ThreadlessHooker_rc_x64.dll
Resource
win10v2004-20230915-en
Target
MDE_File_Sample_fe58ec001d870dfc09104afb1c2d4afbd87975f61161940162e4b90e88989767.zip
Size
674KB
MD5
f040ce55dee06e73db73324c646d132b
SHA1
fcbb4e1204820ea261874a0225ff6cc2aab8cea4
SHA256
15db7e2129cff0f4562f4eb312a0a93f51eb7f6bdbce3cd60552c735e06b56a4
SHA512
0bdc0d633301b2d812636f0619a8e9eab62cc487189a6ac3061e13772281736bcccb86e22e51ce17700af2a6d41c794a55d87556378d3502d13de5b620120f7a
SSDEEP
12288:QoxSdLclgbmhXXK8v7DRvvUkj5YmroFWaOOpkhDiKfnHILXPiD7F07:3xSdLcl7XXVzFvzj5Yms6OpkhuKfHIeo
Checks for missing Authenticode signature.
resource |
---|
unpack001/0517_ThreadlessHooker_rc_x64.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetComputerNameExA
GetCurrentProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetTimeZoneInformation
InitializeCriticalSection
K32EnumProcessModules
K32EnumProcessModulesEx
K32EnumProcesses
K32GetModuleBaseNameA
K32GetModuleFileNameExA
K32GetModuleInformation
LeaveCriticalSection
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
__iob_func
_amsg_exit
_initterm
_lock
_stricmp
_strnicmp
_time64
_unlock
abort
calloc
exit
free
fwrite
malloc
memcmp
memcpy
memset
rand
realloc
srand
strlen
strncmp
vfprintf
wcscmp
DllInstall
DllRegisterServer
DllUninstall
DllUnregisterServer
Think
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ