DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.426f04e70107a3c3567c292cba055f70.dll
Resource
win7-20231020-en
Target
NEAS.426f04e70107a3c3567c292cba055f70.exe
Size
431KB
MD5
426f04e70107a3c3567c292cba055f70
SHA1
03fe758cd1fbda8ff656a05c5f1fcc69861c28f0
SHA256
4c88b625ad363d43ed2236bc8f669366127c10ecb856a5b2c4f06bd5460da406
SHA512
f9d8d1112df3063daac7bbe578b6362a52539354a802cba61a96f31bc5dd288fff8cf8afe4a9c92ba677c3702e29dc7117a094c4309fcaddcc556c73ac746c29
SSDEEP
12288:34lUFILz9GrEESYtXvvinG4/K8FrjxZqL7Hwya:34lgILzMoEXtXvvinG4/hFLqLbwy
Checks for missing Authenticode signature.
resource |
---|
NEAS.426f04e70107a3c3567c292cba055f70.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetLastError
GetFullPathNameW
lstrlenW
ExpandEnvironmentStringsW
GetFileAttributesW
GetSystemDirectoryW
GetModuleHandleA
GetLocaleInfoA
GetLastError
FreeLibrary
GetSystemInfo
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
LoadLibraryExW
GetCurrentProcess
DeleteCriticalSection
LoadLibraryExA
VirtualQuery
VirtualProtect
DisableThreadLibraryCalls
MultiByteToWideChar
GetACP
InitializeCriticalSection
GetModuleFileNameA
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleExW
TerminateProcess
RaiseException
ReadClassStg
CoGetMalloc
StgOpenStorage
RegQueryValueExW
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegGetValueW
RegOpenKeyExW
memset
__CxxFrameHandler3
_except_handler4_common
__std_type_info_destroy_list
wcsrchr
wcscpy_s
wcsncpy_s
wcsncat_s
strncmp
wcsncmp
_stricmp
__stdio_common_vswprintf
__stdio_common_vswprintf_s
atoi
_initialize_onexit_table
_seh_filter_dll
_cexit
_execute_onexit_table
_configure_narrow_argv
_initialize_narrow_environment
_initterm_e
_initterm
__initialize_lconv_for_unsigned_char
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ