DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
0f6872667dda7802aee8c901a8c4c800.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f6872667dda7802aee8c901a8c4c800.dll
Resource
win10v2004-20231222-en
Target
0f6872667dda7802aee8c901a8c4c800
Size
35KB
MD5
0f6872667dda7802aee8c901a8c4c800
SHA1
5de567861fee19fd18c800908f2febcca6e6f791
SHA256
d4737382a27f79bdaeebe26215db007da12383e0fa72ea51132c8b5a095a92dc
SHA512
f76c92566d40ea5dbc9f8bbb234ecec33d892e7d44d014dc9ef4808a6fa8b54bbf4688578e86bc17fbcabdd8b2cc9118764041e27487d471bb324455adeaf4b5
SSDEEP
384:nuDfUdbd8WOARJiNyWAsptshub3J7U0cdET7ZIFey:nS6belqgpAau6lU0cdET7ZIFey
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0f6872667dda7802aee8c901a8c4c800 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
lstrcmpiA
MultiByteToWideChar
GetWindowsDirectoryA
GetVersionExA
GetModuleHandleA
LocalSize
LocalAlloc
LocalReAlloc
GlobalFree
lstrlenA
GlobalAlloc
lstrcpyA
lstrcatA
lstrcmpA
GetModuleFileNameA
CloseHandle
TerminateThread
CreateThread
Sleep
RegQueryInfoKeyA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegEnumKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
_adjust_fdiv
malloc
free
wcslen
_initterm
memcmp
memset
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
ShellExecuteA
lineInitialize
lineNegotiateAPIVersion
lineOpenA
lineGetNewCalls
lineGetCallInfoA
lineShutdown
GetClassNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE