HookProc
bbb
kingsoft
Static task
static1
Behavioral task
behavioral1
Sample
1d6d78407cf2f9d51d0bffd13950509c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d6d78407cf2f9d51d0bffd13950509c.dll
Resource
win10v2004-20231215-en
Target
1d6d78407cf2f9d51d0bffd13950509c
Size
28KB
MD5
1d6d78407cf2f9d51d0bffd13950509c
SHA1
9bc05699ef92d2f5a8df42668cfcca0f3789a373
SHA256
0a9f53de36f7f6151054db457bf09ca8d2ebb1f45193e995805091dca09791e9
SHA512
e2d082e951a5b95ec9cf44ac517a66e060350503fb20329027b7e5bf0c778999592c80e044aa0f81fd20bc9aa5b03353664cc31372bf74906dc8c3056ab1a41f
SSDEEP
384:a5W/X3lJCPENmw7cI9a2iVFDczFE18aAoi3aSwW7EvTia2dq1wcX+hBJ+JjEo:a5SX1YEN5zgDczFm8adSwa024wcXeb8
Checks for missing Authenticode signature.
resource |
---|
1d6d78407cf2f9d51d0bffd13950509c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
GlobalAlloc
GetLastError
CreateMutexA
GetCurrentProcessId
ExitProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetModuleFileNameA
ReadProcessMemory
GetModuleHandleA
GetPrivateProfileStringA
DeleteFileA
ReadFile
GetTempPathA
VirtualAlloc
WideCharToMultiByte
GlobalUnlock
CreateProcessA
GetSystemDirectoryA
GetTickCount
RaiseException
GetLocalTime
GetCurrentThreadId
SetFilePointer
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Process32First
CreateToolhelp32Snapshot
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
CreateFileA
WriteFile
CloseHandle
Sleep
GetCurrentProcess
TerminateProcess
LoadLibraryA
MultiByteToWideChar
GetProcAddress
GetWindowThreadProcessId
CallNextHookEx
GetWindowTextA
SetWindowsHookExA
FindWindowA
ImageLoad
ImageUnload
_strupr
_strcmpi
_strlwr
_stricmp
wcslen
atol
srand
rand
strcpy
sprintf
strlen
memcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
HookProc
bbb
kingsoft
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ