?RemoteFreeLibrary@@YAHPAUHWND__@@PAUHINSTANCE__@@K@Z
?RemoteGetModuleHandleA@@YAPAUHINSTANCE__@@PAUHWND__@@PBDK@Z
?RemoteLoadLibraryA@@YAPAUHINSTANCE__@@PAUHWND__@@PBDK@Z
hook_to
Static task
static1
Behavioral task
behavioral1
Sample
0e680d45eb9787e5e5a4c5a160bcb83d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e680d45eb9787e5e5a4c5a160bcb83d.dll
Resource
win10v2004-20231222-en
Target
0e680d45eb9787e5e5a4c5a160bcb83d
Size
34KB
MD5
0e680d45eb9787e5e5a4c5a160bcb83d
SHA1
52180d21bdd909b1c35a65ffcaf0c02b40b92c77
SHA256
c1bf67939f08bd0b096c584e3a841167607d3de6c5cce4fad4e006220f9ad382
SHA512
b6b2594933733585203f4f908299269c6904ac0283a4ec7e33e927beb51219656a525df94bf739da2c11ea4ac7d8374b8f2511206bc687aa4aafa47bcedbeae6
SSDEEP
768:OHhyyWTN4n9bu0QbhA2dwdGfPUW2kQ5vT:QT9TQ9xdwd8UAQJT
Checks for missing Authenticode signature.
resource |
---|
0e680d45eb9787e5e5a4c5a160bcb83d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_onexit
__dllonexit
_adjust_fdiv
_initterm
time
__CxxFrameHandler
atoi
wcslen
_stricmp
memcmp
strstr
_strupr
strcpy
strncpy
??1type_info@@UAE@XZ
_CxxThrowException
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
_itoa
strlen
malloc
free
memcpy
MultiByteToWideChar
lstrlenW
LocalAlloc
ExitThread
LocalFree
GetExitCodeThread
OpenEventA
FreeLibraryAndExitThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
GetTickCount
Sleep
TerminateThread
CloseHandle
lstrcmpiA
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetModuleFileNameA
WaitForSingleObject
CreateEventA
CreateMutexA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SetEvent
ReleaseMutex
ReadFile
SetFilePointer
GetFileSize
CreateFileA
lstrcatA
GetSystemDirectoryA
lstrcmpA
WriteFile
SetEndOfFile
FlushFileBuffers
FlushViewOfFile
OpenMutexA
CreateProcessA
GetVersionExA
lstrcpynA
GetVolumeInformationA
GetLastError
GetComputerNameA
lstrcpyA
SetThreadPriority
DuplicateHandle
GetCurrentThread
GetCurrentProcess
GetModuleHandleA
DisableThreadLibraryCalls
FreeLibrary
SetLastError
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrlenA
OpenProcess
DestroyWindow
DefWindowProcA
CreateWindowExA
RegisterClassA
MessageBoxA
SendMessageTimeoutA
UnhookWindowsHookEx
CallNextHookEx
GetMessageA
TranslateMessage
SendMessageA
FindWindowA
GetWindow
PostQuitMessage
GetDlgItem
ShowWindow
DispatchMessageA
GetWindowThreadProcessId
EnumWindows
wsprintfA
FindWindowExA
SetWindowPos
SetWindowsHookExA
SysAllocString
VariantCopy
VariantInit
VariantClear
SysFreeString
CoTaskMemFree
OleInitialize
CoCreateInstance
OleUninitialize
CreateStreamOnHGlobal
CryptGetHashParam
CryptReleaseContext
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextA
bind
htonl
htons
socket
WSAStartup
shutdown
send
recv
select
listen
getsockname
connect
gethostname
__WSAFDIsSet
accept
closesocket
WSACleanup
gethostbyname
StrStrIA
?RemoteFreeLibrary@@YAHPAUHWND__@@PAUHINSTANCE__@@K@Z
?RemoteGetModuleHandleA@@YAPAUHINSTANCE__@@PAUHWND__@@PBDK@Z
?RemoteLoadLibraryA@@YAPAUHINSTANCE__@@PAUHWND__@@PBDK@Z
hook_to
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ