det_StartHook
det_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
09135fdec3ffa1b410abe5459de18da1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09135fdec3ffa1b410abe5459de18da1.dll
Resource
win10v2004-20231215-en
Target
09135fdec3ffa1b410abe5459de18da1
Size
96KB
MD5
09135fdec3ffa1b410abe5459de18da1
SHA1
466efd00a8f6aec6c267de3b07a9220c5e0563e0
SHA256
e418a87a9a5b61bf7733c25d0d343408d6fed2efa2f2f6d1b94e8ad114991c15
SHA512
b4bc2c961dc16d206abec821aab8573c1cb963399e41ca0c09a16d878c1a0ebde8fcf3b16e28324c6d6875e8c5a4bc5e36244ba88172dd746192a21c03ae2a8c
SSDEEP
1536:xU/YCRiTbJrSbDfc7jTbmnlB6VIglSOBZeW5Qbg:QfRiTEPfES+eglSOBJGg
Checks for missing Authenticode signature.
resource |
---|
09135fdec3ffa1b410abe5459de18da1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
GetModuleFileNameA
CloseHandle
LocalFree
lstrlenW
FreeLibrary
GetProcAddress
LoadLibraryA
GetShortPathNameA
FlushInstructionCache
lstrlenA
ReadFile
GetFileSize
CreateFileA
lstrcpyW
lstrcmpiW
VirtualProtect
GetCurrentProcess
SetLastError
lstrcatW
WriteFile
GetOEMCP
GetACP
VirtualAlloc
lstrcatA
WideCharToMultiByte
MultiByteToWideChar
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetCPInfo
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
HeapReAlloc
TerminateProcess
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedIncrement
RtlUnwind
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
LCMapStringA
LCMapStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
UnhookWindowsHookEx
CallNextHookEx
wsprintfW
SetWindowsHookExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
UrlApplySchemeW
StrStrW
StrNCatW
PathAppendA
StrDupA
StrStrIW
StrCmpIW
StrCpyW
StrDupW
PathStripPathA
StrCmpNIW
PathRemoveFileSpecA
InternetCrackUrlW
CoInternetParseUrl
det_StartHook
det_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ