EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
556bd9c22b2876e1e13abf497c4eaa3b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
556bd9c22b2876e1e13abf497c4eaa3b.dll
Resource
win10v2004-20231215-en
Target
556bd9c22b2876e1e13abf497c4eaa3b
Size
19KB
MD5
556bd9c22b2876e1e13abf497c4eaa3b
SHA1
7e1ade5fc4bd1f5c21dae8178c9030399bad9ce9
SHA256
ca8c91b126429c5c6ea915bac2aba938007013b1f6b46377b707390b28988cb8
SHA512
b19f4f139c1ee695410391c0046dc796b0a5ded73545dfdf70e50601427a4384b06313ef9fb1222f3399c252419fed2749987f7db198051c122a79d9684eb777
SSDEEP
384:+BAHM8tBbYHwczNvDDHMz3iNoscS4GtcKa:+BYMLrz9KKos6OcKa
Checks for missing Authenticode signature.
resource |
---|
556bd9c22b2876e1e13abf497c4eaa3b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VkKeyScanA
UnhookWindowsHookEx
ToAscii
SetWindowsHookExA
MapVirtualKeyA
GetMessageA
GetKeyboardState
GetForegroundWindow
GetClassNameA
CallNextHookEx
wsprintfA
GetProcAddress
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
WriteProcessMemory
WideCharToMultiByte
VirtualProtectEx
TerminateProcess
Sleep
SetFilePointer
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
DisableThreadLibraryCalls
FindClose
FindFirstFileA
FindNextFileA
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
GlobalAlloc
LoadLibraryA
Module32First
Module32Next
MultiByteToWideChar
Process32First
Process32Next
ReadFile
ReadProcessMemory
RtlZeroMemory
SetFileAttributesA
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ