_DllEntryPoint@12
_HookProcedure@12
Static task
static1
Behavioral task
behavioral1
Sample
0ddd2e98687f832682a8a7fb7af09f0d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ddd2e98687f832682a8a7fb7af09f0d.dll
Resource
win10v2004-20231215-en
Target
0ddd2e98687f832682a8a7fb7af09f0d
Size
7KB
MD5
0ddd2e98687f832682a8a7fb7af09f0d
SHA1
5df33454af0694b2db9148179d5394dc22233a5e
SHA256
35b8c503034a4dc28627a8df60f920d5cbdc5d6d030b1ffb645effc31b2f8aa1
SHA512
f81067a9d618afd3a01987361c97cb6fdeb5b38f0721e0b9fab8acc0531a5a1f854ead4ac2ccb90919578fbb939696292d9bb5c838fc2471bd9c1512dc30d46e
SSDEEP
96:NGI+n9rOdqUTo6zJBp8Q7/+a67OXCxeQPRIq:V+lOvNl67OXsecK
Checks for missing Authenticode signature.
resource |
---|
0ddd2e98687f832682a8a7fb7af09f0d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetEnvironmentStringsA
CloseHandle
RtlUnwind
CreateFileA
SetFilePointer
WriteFile
GetDlgItemTextA
GetKeyState
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
_fdopen
_open_osfhandle
fclose
free
_cexit
malloc
memset
printf
raise
setbuf
strcpy
strlen
strstr
_DllEntryPoint@12
_HookProcedure@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ