call
deleteobj
inject
loadres
loadsys
setcodepage
setgameservice
wsgetattr
wsgetconnlable
wsnew
wspoll
wsrpc
wssend
Static task
static1
Behavioral task
behavioral1
Sample
cec1924e9dbe5dbcca3622e726c641514b089afa2785db98fc1c56bfc5bacb88.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cec1924e9dbe5dbcca3622e726c641514b089afa2785db98fc1c56bfc5bacb88.dll
Resource
win10v2004-20230915-en
Target
cec1924e9dbe5dbcca3622e726c641514b089afa2785db98fc1c56bfc5bacb88
Size
875KB
MD5
1313fb7d6b80d665ae3cb3b3c63bb3bf
SHA1
339f025d1b598c22e0175582e6e80baafa62c291
SHA256
cec1924e9dbe5dbcca3622e726c641514b089afa2785db98fc1c56bfc5bacb88
SHA512
34257028ad257f3157bf82adfe008eada0462dbc42f6d1b5b7bd31e631e1f6e6d849db6c2d5b28d80d0e763475be60b2c11a3bca67a0be170e5134570fe4955f
SSDEEP
12288:2OU9urWdIpjcBYd4JgGy2NO83PY3iqw+yoxphyKJshSMXl1NfJM3d8nsNWv1nZK3:5WGHdQnPYffTzhnJshSMXl1xMdCNo3
Checks for missing Authenticode signature.
resource |
---|
cec1924e9dbe5dbcca3622e726c641514b089afa2785db98fc1c56bfc5bacb88 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
ReadFile
CreateDirectoryW
FindResourceW
LoadResource
SizeofResource
LockResource
CreateFileW
WriteFile
GetLastError
DeviceIoControl
WriteConsoleW
HeapSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
CreateProcessA
CreatePipe
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
Sleep
MultiByteToWideChar
GetFileAttributesW
FindClose
FindNextFileW
SetLastError
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetFileSizeEx
MoveFileExW
DeleteFileW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FindFirstFileW
OutputDebugStringA
RaiseException
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObjectEx
GetExitCodeThread
GetCPInfoExW
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
VirtualAlloc
VirtualFree
RtlUnwind
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
HeapFree
HeapAlloc
GetStdHandle
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetCurrentDirectoryW
GetFullPathNameW
CompareStringW
LCMapStringW
GetLocaleInfoW
SetEndOfFile
FindWindowA
SendMessageW
IsWindow
RegQueryValueExA
RegCloseKey
OpenSCManagerW
CreateServiceW
DeleteService
ControlService
CloseServiceHandle
StartServiceW
OpenServiceW
RegOpenKeyExA
listen
WSAStartup
getpeername
getsockname
send
socket
closesocket
recvfrom
recv
sendto
ioctlsocket
setsockopt
WSAGetLastError
select
bind
__WSAFDIsSet
accept
connect
GetIfEntry
GetAdaptersInfo
call
deleteobj
inject
loadres
loadsys
setcodepage
setgameservice
wsgetattr
wsgetconnlable
wsnew
wspoll
wsrpc
wssend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ