JumpHookOff
JumpHookOn
SetHook
UnHook
Static task
static1
Behavioral task
behavioral1
Sample
1d1c00f80542af3a5655ec07dc54997d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d1c00f80542af3a5655ec07dc54997d.dll
Resource
win10v2004-20231222-en
Target
1d1c00f80542af3a5655ec07dc54997d
Size
24KB
MD5
1d1c00f80542af3a5655ec07dc54997d
SHA1
7ca676b29292eeb51e038bf94b1417c85698def4
SHA256
181e44b40ec1e6f5878a5d90d51190a2ffbb81a38239336a4fb30074354acdc1
SHA512
8b2da41dc0eca1c75d3fbbcf77e2c042ad0f6f17e293650ecc15486ceb07e4b7e1f8575024392be987edecbf8097f50c96d9963a40a7c80b802aca0bce996b10
SSDEEP
192:+ppjKUdkmczN1Q/2I/N12JPOLmc44X4IeXXGqiKh4WqiYZKLQCWheaD:+pbdwzN6/2MwXcLen/4lC2
Checks for missing Authenticode signature.
resource |
---|
1d1c00f80542af3a5655ec07dc54997d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
LoadLibraryA
CreateThread
CreateMutexA
VirtualProtect
Process32Next
WriteProcessMemory
WaitForSingleObject
ExitProcess
lstrlenA
ReadProcessMemory
GetProcAddress
CreateEventA
GetCurrentDirectoryA
GetModuleHandleA
OpenProcess
TerminateProcess
CloseHandle
SetEvent
Sleep
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
DispatchMessageA
TranslateMessage
KillTimer
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
DestroyWindow
PostQuitMessage
DefWindowProcA
wsprintfA
PostThreadMessageA
SetTimer
GetMessageA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
fputs
atol
fopen
fread
free
time
exit
memcmp
__CxxFrameHandler
_initterm
malloc
_adjust_fdiv
_strlwr
fclose
strlen
strcat
strcpy
_itoa
strcmp
memset
??2@YAPAXI@Z
send
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
JumpHookOff
JumpHookOn
SetHook
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ