DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0b883762ad7c32450c3723579285fa57.dll
Resource
win7-20231129-en
Target
0b883762ad7c32450c3723579285fa57
Size
53KB
MD5
0b883762ad7c32450c3723579285fa57
SHA1
e4192573a4449c490a670b0ae388cbd28b06a17c
SHA256
818fc3372dcef403c7bbb3b019220077b71200c2ce2b86e325efa17b52d65e80
SHA512
547253ed5c27b122e7e4b4f42540a11d0225f850a94d93cc7c114252a28984bfd07b621aa65a3043c7d7f62d0bd6dfb9d07c75e211eb083e91a980cefbcc6b12
SSDEEP
768:wH42daXm0BTz+osQUJPn4LQdrcK6G+CRfPf:wH42oBTCosQUJPn4kFcK+GH
Checks for missing Authenticode signature.
resource |
---|
0b883762ad7c32450c3723579285fa57 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
ExitThread
WaitForSingleObject
lstrcpyW
GetVersionExA
GetSystemDirectoryA
lstrlenW
lstrcatW
GetModuleHandleA
GetProcessHeap
HeapFree
IsBadStringPtrA
lstrcmpA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
GetCurrentDirectoryA
GetWindowsDirectoryA
SetEvent
PulseEvent
CloseHandle
ResetEvent
HeapAlloc
HeapReAlloc
lstrlenA
CompareStringW
Sleep
lstrcatA
SetFilePointer
CreateFileA
ReleaseMutex
SetEndOfFile
GetModuleHandleW
CreateEventA
CreateMutexW
CreateThread
ReadFile
WriteFile
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
lstrcpyA
CharUpperW
wsprintfA
CharLowerA
wsprintfW
GetForegroundWindow
InitializeSecurityDescriptor
CryptReleaseContext
CryptDestroyKey
CryptDestroyHash
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptEncrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptDecrypt
SysAllocString
SysFreeString
InternetConnectA
InternetCrackUrlA
InternetCrackUrlW
CoInternetCombineUrl
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ