DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9aa49514686ee1f24dbec7060640b640.dll
Resource
win10v2004-20231023-en
Target
NEAS.9aa49514686ee1f24dbec7060640b640.exe
Size
388KB
MD5
9aa49514686ee1f24dbec7060640b640
SHA1
5e901e545276a266de4889cfb415fb1e14fbd6a8
SHA256
53f1a750d3d3c0e83937f3e9c31c6e0404400ae6845b6305b4e59aad8fb5d79e
SHA512
cffa8f3a2eb75bcce16494f1aed36bf06be34c1843f3ec7974dabb5d9a7de7e890272bfb605f20e2d654afcd29321c0741c73a0bbbecf7caf7030212a5a71476
SSDEEP
6144:Kw1AyZaSY7DQ6+luv82BFSy3nTlY7Tce/GzEUVR7ZDh0uDFMa:l1AHXQ5luvb7X3nTlYfc5hZD
Checks for missing Authenticode signature.
resource |
---|
NEAS.9aa49514686ee1f24dbec7060640b640.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
_ultow_s
_wcsicmp
wcsncpy_s
memcmp
_CxxThrowException
_wsplitpath_s
__C_specific_handler
_purecall
_wmakepath_s
memmove
_vsnwprintf
free
malloc
_XcptFilter
__CxxFrameHandler3
_amsg_exit
_initterm
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
memcpy
_wcsnicmp
memset
UMSEnterCSWraper
?ReadOrWriteUnlock@CReaderWriterLock3AR@@QEAAX_N@Z
?ReadOrWriteLock@CReaderWriterLock3AR@@QEAA_NXZ
?WriteUnlock@CReaderWriterLock3AR@@QEAAXXZ
?WriteLock@CReaderWriterLock3AR@@QEAAXXZ
??1CReaderWriterLock3AR@@QEAA@XZ
MPDeleteCriticalSection
FXMemDetach
MpGetHeapHandle
FXMemAttach
MPInitializeCriticalSection
MpHeapAlloc
MpHeapFree
HeapDestroy
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
MultiByteToWideChar
GetUserDefaultLCID
GetWindowsDirectoryW
LCMapStringW
TlsFree
TlsAlloc
GetModuleHandleW
CompareStringW
GetCurrentThreadId
TlsGetValue
TlsSetValue
LoadLibraryExW
GetDriveTypeW
VirtualQuery
FreeLibrary
GetCurrentProcessId
DeleteCriticalSection
GetProcAddress
SearchPathW
EnterCriticalSection
GetFullPathNameW
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetSystemDirectoryW
OutputDebugStringW
DisableThreadLibraryCalls
LoadStringW
PostMessageW
RegGetValueW
RegCloseKey
RegisterTraceGuidsW
UnregisterTraceGuids
RegOpenKeyExW
RegQueryValueExW
CoCreateInstance
CoTaskMemFree
CoCreateFreeThreadedMarshaler
OaBuildVersion
LoadTypeLi
SysAllocString
SysAllocStringLen
SafeArrayPutElement
SafeArrayGetElement
SysStringLen
GetErrorInfo
VariantClear
VariantChangeType
SetErrorInfo
LoadRegTypeLi
VariantInit
SysFreeString
SafeArrayDestroy
SafeArrayCopy
SafeArrayCreate
SafeArrayUnlock
VariantCopy
CreateErrorInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ