DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
000eebe2154eb9b9cc4a191c1e979d8f.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
000eebe2154eb9b9cc4a191c1e979d8f.dll
Resource
win10v2004-20231222-en
Target
000eebe2154eb9b9cc4a191c1e979d8f
Size
48KB
MD5
000eebe2154eb9b9cc4a191c1e979d8f
SHA1
bb77191cae9b54ceebe1883a3381cbfad18faf26
SHA256
bd12cc4cb0c6b611e227602cd7b8b67ffbb134bc3a71307a0c07a089f6949d1c
SHA512
0256c4a049f207276f5a5657e6f8c7a9d45e51107fb0527fc40608521eeb5159f32fc6785fc4518d340fef1dbeb3009bf85d201df614b3c8316097857fb60216
SSDEEP
768:m1SWbVFkuKNC6bQ2SsRwp7cXwvJF2N4fZ00GuVwBwaglGO7OLA:qZCuK/U2Op7nvJF2NuBGHw1GuO
Checks for missing Authenticode signature.
resource |
---|
000eebe2154eb9b9cc4a191c1e979d8f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
DeleteFileA
Process32Next
Process32First
GetCommandLineW
WritePrivateProfileStringA
GetSystemDirectoryA
GetWindowsDirectoryA
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
Sleep
CreateThread
WideCharToMultiByte
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CreateEventA
GetLastError
GetLocalTime
InitializeCriticalSection
CloseHandle
DispatchMessageA
FindWindowExA
CreateWindowExA
ShowWindow
SetWindowTextA
IsWindow
CallNextHookEx
RegisterClassExA
KillTimer
SetTimer
PostMessageA
DefWindowProcA
GetMessageA
TranslateMessage
SendMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
_purecall
strstr
_strlwr
strcmp
strchr
fopen
fwrite
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
fclose
??2@YAPAXI@Z
_access
strcat
strcpy
strrchr
rand
strlen
memcpy
memset
??3@YAXPAX@Z
sprintf
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ