InstallHook
UninstallHook
setafase
Static task
static1
Behavioral task
behavioral1
Sample
17112023_1833_pDLL.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
17112023_1833_pDLL.dll
Resource
win10v2004-20231023-en
Target
17112023_1833_pDLL.dll
Size
30KB
MD5
01daaa57a7ab91c30f9566bdad5b5081
SHA1
036ec1048d4023ce2156ea919e8b26a81a910920
SHA256
d596cc770333eee75ea3a77ae4bc08e588e84ac032c9e60d94d437eb6c099207
SHA512
3a05ba5867f2205e3732701ed4f368bae061cb54bd6c1af2595c36fd4876e933f1610450bdb109413676cf0b89f433ea1b2a9e815cf1d8f801cbfd9363744a7b
SSDEEP
384:T7OaDF6pdP2NnRa+7H9NeANX6JBe0dJPV7Fa8CuqdC4GzzfVd/5G9pGiHqOIxg:TaaDg5271vp0fJq8mQzNsTK
Checks for missing Authenticode signature.
resource |
---|
17112023_1833_pDLL.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
MessageBoxA
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
Sleep
VirtualFree
VirtualAlloc
VirtualQuery
GetSystemInfo
GetVersion
SetThreadLocale
GetACP
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetCommandLineW
FreeLibrary
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
GetVersionExW
GetModuleHandleW
FreeLibrary
InstallHook
UninstallHook
setafase
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ