EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
68572fdc8d4a55a7faa3ac69c50be983.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68572fdc8d4a55a7faa3ac69c50be983.dll
Resource
win10v2004-20231215-en
Target
68572fdc8d4a55a7faa3ac69c50be983
Size
539KB
MD5
68572fdc8d4a55a7faa3ac69c50be983
SHA1
8e20baddd75c80828ccb836c2b1cb07baad149cb
SHA256
f00e87e4376f24816cb00d5045c2317efc05faee4ed0c8c75fe26601d1bd1143
SHA512
4adeb00183c5b0f76a3e6abe2604efadb311410273f8daeb68d74bba412bb16ac8f4d7afb910acb68cd4e66c6525d0bcac34915a67ab1a62937d5dec9e114c48
SSDEEP
6144:49494949494949494949494949494949494949494949:
Checks for missing Authenticode signature.
resource |
---|
68572fdc8d4a55a7faa3ac69c50be983 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowTextA
GetForegroundWindow
GetDC
GetClientRect
wsprintfA
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
ReadFile
RtlMoveMemory
RtlZeroMemory
SetFileAttributesA
DisableThreadLibraryCalls
Sleep
TerminateProcess
VirtualAlloc
GetTempPathA
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
DeleteFileA
CreateThread
GetProcAddress
GetModuleFileNameA
CreateFileA
CloseHandle
GetFileSize
GetCurrentProcess
VirtualFree
ExitThread
SetFilePointer
RegQueryValueExA
StrStrA
StrChrA
DeleteDC
BitBlt
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
CLSIDFromString
GdiplusShutdown
GdipSaveImageToFile
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdiplusStartup
WSAStartup
connect
gethostbyname
inet_addr
ntohs
recv
send
socket
WSACleanup
closesocket
strrchr
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ