?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
1f9493582c5f39eff83e4d616a5d0c2d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f9493582c5f39eff83e4d616a5d0c2d.dll
Resource
win10v2004-20231222-en
Target
1f9493582c5f39eff83e4d616a5d0c2d
Size
13KB
MD5
1f9493582c5f39eff83e4d616a5d0c2d
SHA1
708442643cc204b4dec3077a76f02da07c0e3e65
SHA256
442e20d69a4902ce85904987123fbc88b9d1833e2a8ef300802570f010b762be
SHA512
47788273d660729ee542fc4c440d79f68be7186d4f735243612bb8572415ad211ea80f554e2b10451e207a32af08baa66777808bb7c9bf29fd6942aaaeb7f870
SSDEEP
192:UMu+Te979tTi4iOok5txAsEfQMZGc1PHTTpWJYED/5qEaSVow:UjwI7+wtAsEfrL1PzTpWG6g1
Checks for missing Authenticode signature.
resource |
---|
1f9493582c5f39eff83e4d616a5d0c2d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
StrToIntA
EnumProcessModules
ord1089
??1type_info@@UAE@XZ
GetAsyncKeyState
SHGetSpecialFolderPathA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE