GetMsg
InjectDll
UnmapDll
Static task
static1
Behavioral task
behavioral1
Sample
6c3e008bdef52464ffb83c797d5b975e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c3e008bdef52464ffb83c797d5b975e.dll
Resource
win10v2004-20231215-en
Target
6c3e008bdef52464ffb83c797d5b975e
Size
55KB
MD5
6c3e008bdef52464ffb83c797d5b975e
SHA1
02ab3caa0cdae6dda84f8f62723cfad201301c35
SHA256
09f260d2a4e3ea3ce89e9d569cd228901efe3e75c77787713b35df00396bb507
SHA512
bb9b3d91076ee70c5da5265fb4dd2fbdf7a1624b0f81a4453ec087ebd21f0f550502abc0a74d091532e5bf873e2872811877208dd1cfaa4454478f52f3cdd7e7
SSDEEP
768:oEMOVJAuro271MPhxpPXL0/kTWD9JWN22scyk1agj5NIn:owQO71yXL+vD9JF2Rn5NI
Checks for missing Authenticode signature.
resource |
---|
6c3e008bdef52464ffb83c797d5b975e |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
FreeLibrary
LoadLibraryA
GetModuleFileNameA
FlushFileBuffers
CloseHandle
CreateFileA
HeapSize
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RegisterWindowMessageA
IsWindow
GetWindowThreadProcessId
SetWindowsHookExA
SendMessageA
UnhookWindowsHookEx
SetWindowLongA
CallNextHookEx
CallWindowProcA
GetMsg
InjectDll
UnmapDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ