InitShellEx
SetWindowEvent
ShellNotifyUser
ShellNotifyUserEx
Static task
static1
Behavioral task
behavioral1
Sample
4fb4d2eb303160c5f419cec2e9f57850.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fb4d2eb303160c5f419cec2e9f57850.dll
Resource
win10v2004-20231215-en
Target
4fb4d2eb303160c5f419cec2e9f57850
Size
384KB
MD5
4fb4d2eb303160c5f419cec2e9f57850
SHA1
fc1d922999c85733b990858479262d81fe522314
SHA256
3f0a9910bd21fe98d372e58bd58f80a277a25cb8d1d27ee51831b8ba4d164185
SHA512
f2c2ad504e69766d98cf059fa39e0fad189e57558158aecd1fdbc92c3dd8bcf6a5811fc3cdd67bb29586aae0d3b594166eef4b84d6f32e80c8d404dba8811189
SSDEEP
6144:Oed1eg4UGpE9s5eCrwXJk+K+j3697z17ma2Mz:V1dG29CokL+j387zdma2
Checks for missing Authenticode signature.
resource |
---|
4fb4d2eb303160c5f419cec2e9f57850 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameExW
GetModuleBaseNameW
InterlockedIncrement
GetModuleHandleW
OpenProcess
GetProcAddress
GetExitCodeThread
EnumResourceNamesW
GetComputerNameW
GetVersionExW
GetSystemTimeAsFileTime
FindClose
CloseHandle
LocalFree
ExpandEnvironmentStringsW
FindFirstFileW
MoveFileExW
ProcessIdToSessionId
RemoveDirectoryW
CreateDirectoryW
FindNextFileW
DeleteFileW
WideCharToMultiByte
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateEventW
OpenEventW
SetEvent
VirtualFreeEx
VirtualAllocEx
WriteProcessMemory
SetFilePointer
GetFileSize
WriteFile
ReadFile
CreateFileW
SizeofResource
LockResource
FindResourceW
LoadResource
ReleaseMutex
CreateMutexW
WaitForMultipleObjects
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
InterlockedDecrement
GetVersionExA
HeapAlloc
GetProcessHeap
RtlUnwind
RaiseException
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetModuleHandleA
TlsGetValue
TlsAlloc
WaitForSingleObject
TlsFree
SetLastError
HeapSize
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
Sleep
TerminateThread
GetCurrentProcessId
lstrlenA
GetCurrentProcess
GetLastError
CreateThread
GetCommandLineA
TlsSetValue
PeekMessageA
MsgWaitForMultipleObjects
MessageBoxA
MessageBoxW
DispatchMessageA
PostThreadMessageA
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetUserNameW
RegQueryValueExW
RegCloseKey
LookupPrivilegeValueW
SetSecurityDescriptorDacl
AdjustTokenPrivileges
InitializeSecurityDescriptor
RegSetValueExW
OpenProcessToken
RegOpenKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
CoCreateInstance
OleRun
CoUninitialize
CoTaskMemFree
CoInitializeEx
SysAllocString
SysFreeString
VariantInit
VariantClear
VariantChangeType
GetErrorInfo
InitShellEx
SetWindowEvent
ShellNotifyUser
ShellNotifyUserEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ