det_StartHook
det_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
0eb0cb022e4ff8a698ee747b1f2515b1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0eb0cb022e4ff8a698ee747b1f2515b1.dll
Resource
win10v2004-20231215-en
Target
0eb0cb022e4ff8a698ee747b1f2515b1
Size
80KB
MD5
0eb0cb022e4ff8a698ee747b1f2515b1
SHA1
9585223e9a4cb4a20201c19244418ca92da9fee9
SHA256
317494d3addc56b360104c6f869288bec7fe8cfc2cd4697ea10690d63b7cf9cd
SHA512
0f210633e4884831d8cbf23b9b9ccec67271b4a20faf30565f54513e435ddffe02e8da031c44503fde616a37433699bdde487dc354ac5e9f8cbfaf41710e0b82
SSDEEP
1536:xU/YCRiTbJrSbDfc7jTbmnlB6VIglSOBZ9:QfRiTEPfES+eglSOBn
Checks for missing Authenticode signature.
resource |
---|
0eb0cb022e4ff8a698ee747b1f2515b1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
GetModuleFileNameA
CloseHandle
LocalFree
lstrlenW
FreeLibrary
GetProcAddress
LoadLibraryA
GetShortPathNameA
FlushInstructionCache
lstrlenA
ReadFile
GetFileSize
CreateFileA
lstrcpyW
lstrcmpiW
VirtualProtect
GetCurrentProcess
SetLastError
lstrcatW
WriteFile
GetOEMCP
GetACP
VirtualAlloc
lstrcatA
WideCharToMultiByte
MultiByteToWideChar
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetCPInfo
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
HeapReAlloc
TerminateProcess
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedIncrement
RtlUnwind
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
LCMapStringA
LCMapStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
UnhookWindowsHookEx
CallNextHookEx
wsprintfW
SetWindowsHookExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
UrlApplySchemeW
StrStrW
StrNCatW
PathAppendA
StrDupA
StrStrIW
StrCmpIW
StrCpyW
StrDupW
PathStripPathA
StrCmpNIW
PathRemoveFileSpecA
InternetCrackUrlW
CoInternetParseUrl
det_StartHook
det_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ