MHook
MUnHook
Static task
static1
Behavioral task
behavioral1
Sample
0b091e033377793b8bd54b7872a6343a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b091e033377793b8bd54b7872a6343a.dll
Resource
win10v2004-20231215-en
Target
0b091e033377793b8bd54b7872a6343a
Size
60KB
MD5
0b091e033377793b8bd54b7872a6343a
SHA1
4f1e3102e914bfef3238a7336c5683b4c1814d0a
SHA256
c13ee967834f6458af4bcd6c2613037fc119f1599eea17a99b63f5fe73169ffa
SHA512
7bec9908f165d098a2cdbde1c1882bf82996600f50104e53f3227c5d2bc329c83861d29f46d95fd29cf5ca5ee7d8d49bbd27f3c3278a720bb39ec338e9686ddf
SSDEEP
768:rB85T53XwxGAuUWfwmU07dic4C8+G97kHSJwU3td:rB8nIGRYc4C8++7Tpf
Checks for missing Authenticode signature.
resource |
---|
0b091e033377793b8bd54b7872a6343a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CallNextHookEx
SetWindowsHookExA
MessageBoxA
FindWindowExA
GetActiveWindow
GetWindowTextA
UnhookWindowsHookEx
GetWindowsDirectoryA
GetProcAddress
CloseHandle
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
WriteFile
VirtualProtect
GetModuleHandleA
SetFilePointer
LoadLibraryA
CreateFileA
InternetReadFile
StrStrA
MHook
MUnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ