DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
Static task
static1
Behavioral task
behavioral1
Sample
0cc0f9ca156df482bc1d39817d1fdfa7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cc0f9ca156df482bc1d39817d1fdfa7.dll
Resource
win10v2004-20231222-en
Target
0cc0f9ca156df482bc1d39817d1fdfa7
Size
142KB
MD5
0cc0f9ca156df482bc1d39817d1fdfa7
SHA1
380525d20f49246e361a0e78efda34dd7716de3e
SHA256
9d76e5ed2f15c0951509072e380d2bcf445a0cbc2c280569070f9f74b51fe917
SHA512
0b7965024af565dc3932490bff683e4f37dbaf0d6a388eedfcc7b4250b55bfe4b3645d92553c0c6ad70677ae2914f5aaa7a258199eb880f06882dee777d33244
SSDEEP
3072:p/85h0YScDk3PU7vrW/ZXwc1Rk8CObyjO/YC6JZ:p/ONZDkPqvrW/ZXwcz4ly8
Checks for missing Authenticode signature.
resource |
---|
0cc0f9ca156df482bc1d39817d1fdfa7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TlsGetValue
SystemTimeToFileTime
GetSystemTime
lstrlenA
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
GetLastError
CreateMutexA
GetModuleFileNameW
lstrcpynA
GetVersionExA
LoadLibraryA
MapViewOfFile
CreateFileMappingA
GetCommandLineA
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetWindowsDirectoryA
OpenMutexA
lstrcmpA
Sleep
CreateProcessA
CopyFileA
Process32Next
Process32First
SetLastError
WideCharToMultiByte
MultiByteToWideChar
OpenProcess
lstrlenW
VirtualAllocEx
CreateRemoteThread
GetExitCodeThread
VirtualFreeEx
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
SetEvent
CreateEventA
CreateThread
WaitForSingleObject
TerminateThread
CreateToolhelp32Snapshot
GetModuleFileNameA
GetSystemDirectoryA
LoadLibraryExA
ReadProcessMemory
FreeLibrary
VirtualQuery
lstrcmpiA
GetVersion
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
OpenFileMappingA
WritePrivateProfileSectionA
MoveFileExA
WriteFile
GetPrivateProfileStructA
GetTempPathA
GetPrivateProfileIntA
WritePrivateProfileStructA
lstrcatA
FindFirstFileA
FindNextFileA
FindClose
lstrcpyA
DeviceIoControl
GetTickCount
InterlockedDecrement
LoadLibraryW
IsDebuggerPresent
GetACP
DeleteFileA
RegisterWindowMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowA
PostMessageA
DefWindowProcA
GetWindowLongA
wsprintfA
FindWindowExA
GetClassNameA
SetWindowLongA
IsWindow
CreateWindowExA
GetWindowThreadProcessId
SetWindowsHookExA
SetWindowsHookExW
SetTimer
EnumWindows
SendMessageA
GetParent
GetWindowTextA
CallNextHookEx
UnhookWindowsHookEx
KillTimer
DestroyWindow
PostQuitMessage
GetClassInfoExA
RegisterClassExA
GetStockObject
RegQueryValueExA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyExA
RegEnumKeyA
RegEnumValueA
RegCloseKey
RegNotifyChangeKeyValue
RegOpenKeyExA
RegQueryValueExW
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
OpenServiceA
QueryServiceStatus
StartServiceA
ControlService
RegSetValueExW
RegOpenKeyExW
CoTaskMemFree
StringFromCLSID
SysFreeString
SysAllocString
PathRemoveBlanksA
PathAppendA
PathFileExistsA
StrStrIA
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
PathRemoveBackslashA
PathRemoveFileSpecA
PathRemoveExtensionA
SHGetValueA
ImageDirectoryEntryToData
_mbsicmp
rand
wcscpy
sprintf
_mbsnbicmp
_mbschr
srand
time
_mbscmp
_mbsnbcpy
_snprintf
fclose
fwrite
fopen
sscanf
_tempnam
wcslen
_wcsicmp
tmpnam
fseek
fputs
strstr
fgets
rewind
strrchr
strchr
fread
ftell
malloc
_strnicmp
strncpy
_stricmp
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
memmove
realloc
free
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_itoa
_strlwr
_CxxThrowException
_wcsnicmp
WSACleanup
gethostbyname
gethostname
WSAStartup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ