?CleanHook@@YAEXZ
?SetHook@@YAEPB_W@Z
Static task
static1
Behavioral task
behavioral1
Sample
0694bf7bd8e98b67c6af7c6ac08697e3.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0694bf7bd8e98b67c6af7c6ac08697e3.dll
Resource
win10v2004-20231215-en
Target
0694bf7bd8e98b67c6af7c6ac08697e3
Size
288KB
MD5
0694bf7bd8e98b67c6af7c6ac08697e3
SHA1
f14eb51cb670ae5d698b5331c0a9e0505a91adad
SHA256
5324d310327afb5972ea6b0d855900c51b195d98a6e9f17fa4ef2e08e809dd97
SHA512
bcb10355a2c8fda32223029d34bcd32639fd446896e42053faf5ee8eaa50194c4c4f90a9889d92fd47a2b01b68c966fb018d675ff0ee3e28a0cce726a19c601b
SSDEEP
6144:hznf2Vcb3TOa+dZ6oRQd1DgVDf9qICp0xufmJyVkvSp:hznOVcbSa+xRQLguICp0gekVkvI
Checks for missing Authenticode signature.
resource |
---|
0694bf7bd8e98b67c6af7c6ac08697e3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?WriteLog@@YAXPB_WZZ
GetStartupInfoA
ExitProcess
GetCommandLineW
GetModuleFileNameW
GetLastError
GetModuleHandleW
FlushFileBuffers
CloseHandle
CreateFileA
GetConsoleOutputCP
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapValidate
IsBadReadPtr
MultiByteToWideChar
LCMapStringA
WideCharToMultiByte
LCMapStringW
RaiseException
DebugBreak
LoadLibraryA
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
WriteFile
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
HeapReAlloc
VirtualAlloc
VirtualQuery
FreeLibrary
InitializeCriticalSection
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetParent
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
?CleanHook@@YAEXZ
?SetHook@@YAEPB_W@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ