__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
9f27cf7799d1c76685e671a7cbe5a125.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9f27cf7799d1c76685e671a7cbe5a125.dll
Resource
win10v2004-20231222-en
Target
9f27cf7799d1c76685e671a7cbe5a125
Size
240KB
MD5
9f27cf7799d1c76685e671a7cbe5a125
SHA1
88c63c28ca4be75da4b42e1f36c2edfb82e44a4e
SHA256
212a8c29c3cb6a6917c0f4712153e3580373672d7021e3204435c1f35f1c6873
SHA512
3b39dd4c9fe9233f51ced309f4f6f2f19db82b392a38449204364becc654c1c5aab946110ed9d7c2e6bbe15f4dbb03dd286d4a463021a28bf1920e89a4140a03
SSDEEP
3072:EPdOGtrbR4D3Q44KwevJJkaIFKg0XWQ6uYr4dRYltxOagyMt:EFlVGA44KTkaIFSXWYYlmagN
Checks for missing Authenticode signature.
resource |
---|
9f27cf7799d1c76685e671a7cbe5a125 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
SysFreeString
SysReAllocStringLen
SysAllocStringLen
Sleep
VirtualFree
VirtualAlloc
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
SetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
GetACP
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetCommandLineW
FreeLibrary
UnhandledExceptionFilter
RtlUnwindEx
RtlUnwind
RaiseException
ExitProcess
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
WriteProcessMemory
WriteFile
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAllocEx
VirtualAlloc
TerminateProcess
Sleep
SetUnhandledExceptionFilter
SetThreadPriority
SetPriorityClass
SetFileTime
SetFilePointer
SetFileAttributesA
SetEndOfFile
ResumeThread
ReleaseMutex
ReadFile
OpenProcess
OpenMutexA
OpenFileMappingA
MoveFileA
MapViewOfFile
LocalFree
LoadLibraryA
LoadLibraryW
InitializeCriticalSection
HeapFree
HeapAlloc
GetVolumeInformationA
GetVersionExW
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleHandleW
GetModuleFileNameA
GetLastError
GetFullPathNameA
GetFileTime
GetFileAttributesA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
FindNextFileA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitThread
DeviceIoControl
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CopyFileA
CompareStringA
CloseHandle
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumValueA
RegEnumKeyA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
InitializeSecurityDescriptor
AdjustTokenPrivileges
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
SetEntriesInAclA
StartServiceW
OpenServiceA
OpenSCManagerA
OpenSCManagerW
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
RtlInitUnicodeString
ZwUnloadDriver
ZwLoadDriver
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ