Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
get_Key
Behavioral task
behavioral1
Sample
29ba6a3ae6cb909e4ac1094b0c314258.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29ba6a3ae6cb909e4ac1094b0c314258.dll
Resource
win10v2004-20231215-en
Target
29ba6a3ae6cb909e4ac1094b0c314258
Size
34KB
MD5
29ba6a3ae6cb909e4ac1094b0c314258
SHA1
642f25b21c1974cf7757d778b71411e959612038
SHA256
8f78d49863e0b5f58c7ef50e7fe0ce2a0c271186ed0c37967234730bff37b419
SHA512
0dd608790416040eb0b138f175327e637540840c0307a8fb6c94aad140b4de422876f9ae108eb50fa692296b2ed616bf96e5853cb60f256ed7fca10608c96926
SSDEEP
768:2qdw2Gc8PJ78Y3lbNq7V20NRC2l3nrlZi7793LER3ONfFn+mhgZ:dd/oJt3lbg1C2l3nrlZeLgwV+m
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
29ba6a3ae6cb909e4ac1094b0c314258 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnableMenuItem
DestroyWindow
DestroyIcon
DestroyCursor
CreateMenu
CreateAcceleratorTableA
CopyRect
CopyImage
CloseWindow
CharUpperA
CharLowerA
BeginPaint
FindResourceA
lstrcatA
WriteFile
VirtualFree
VirtualAlloc
TlsSetValue
SleepEx
SetLastError
RtlUnwind
LoadResource
GetVersion
GetStartupInfoA
GetFileSize
CloseHandle
CompareStringA
FreeResource
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
get_Key
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ