Inject
ShellProcedure
Static task
static1
Behavioral task
behavioral1
Sample
24b89e36dee0a6676a5bea79a8573008.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24b89e36dee0a6676a5bea79a8573008.dll
Resource
win10v2004-20231215-en
Target
24b89e36dee0a6676a5bea79a8573008
Size
6.5MB
MD5
24b89e36dee0a6676a5bea79a8573008
SHA1
ee4dc2c2621c9b5c465c51eb2beb93804a4c986f
SHA256
e6f51e8f4ef5af852b820cbadfa7710f10be5a13fe4615ec443c8ad06e89dcde
SHA512
2ee733256f99752567463842dad5ae085de652f34dc79648ad449d7d22cfb8b692a56eadb73e6f6537d247936aedd2a00fe69886c39b1c0abfa40c2b0f776ebc
SSDEEP
196608:FbUyr9J0kjHjSsqZJvNxFUsyjjwgTywI3b:FzJ0kvwvvNxF9yo
Checks for missing Authenticode signature.
resource |
---|
24b89e36dee0a6676a5bea79a8573008 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFindFileNameA
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
HeapFree
SetEndOfFile
CreateFileW
WriteConsoleW
GetFullPathNameW
GetEnvironmentVariableW
FindResourceW
LoadResource
CreateProcessW
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
SetEvent
GetModuleHandleW
CreateRemoteThread
VirtualFreeEx
Sleep
SizeofResource
GetProcAddress
VirtualAllocEx
LockResource
OpenEventW
CloseHandle
WriteProcessMemory
ResumeThread
SetStdHandle
LoadLibraryW
GetCurrentThread
DebugActiveProcess
GetThreadContext
SetThreadContext
DebugActiveProcessStop
GetThreadSelectorEntry
ReadProcessMemory
VirtualProtectEx
GetProcessId
DebugSetProcessKillOnExit
ContinueDebugEvent
WaitForDebugEvent
CheckRemoteDebuggerPresent
SuspendThread
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetLastError
SetLastError
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
ExitProcess
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
ord51
ord92
Inject
ShellProcedure
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ