SetHooks
UnHook
Static task
static1
Behavioral task
behavioral1
Sample
01f735bafb98d2ce0e60e22c0ae2cc4b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f735bafb98d2ce0e60e22c0ae2cc4b.dll
Resource
win10v2004-20231215-en
Target
01f735bafb98d2ce0e60e22c0ae2cc4b
Size
20KB
MD5
01f735bafb98d2ce0e60e22c0ae2cc4b
SHA1
ba2524e71c8028729f3b63b2eefeb7216983fb38
SHA256
71f75fbccb7797a605c7dcca24bba0894cc051f4553a6e01dd96320bc8d331bf
SHA512
73b638dd2d51fbecf64d1115ec38fbefc99a3c98499dccbb0b8cf9f4ae63665cd4f2cd4ab3824de8fa58502c7b0a88eccd7990de7ead645e393060a3f30c69a9
SSDEEP
96:Zy7eZonsDr6HO5AAEgL3epYYVhSnk3jL8i:Z6e0s3r+K3e73jo
Checks for missing Authenticode signature.
resource |
---|
01f735bafb98d2ce0e60e22c0ae2cc4b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
lstrcatA
GetSystemDirectoryA
SetFileAttributesA
_lclose
_lcreat
_lopen
CloseHandle
WriteFile
lstrlenA
SetFilePointer
CreateFileA
GetTimeFormatA
GetDateFormatA
SetWindowsHookExA
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
SendMessageA
GetForegroundWindow
strcmp
_strupr
strtok
strstr
fopen
fgets
strcspn
??2@YAPAXI@Z
fclose
SetHooks
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ