VulanHookDll
VulanUnHookDll
Static task
static1
Behavioral task
behavioral1
Sample
15435325f5b160a3ab9e25ad538727b0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15435325f5b160a3ab9e25ad538727b0.dll
Resource
win10v2004-20231215-en
Target
15435325f5b160a3ab9e25ad538727b0
Size
48KB
MD5
15435325f5b160a3ab9e25ad538727b0
SHA1
e8b110429d4c922644181291055b674af0a1d614
SHA256
e7d06fc0067183939892311055edd0cff0e7b3f490af0949cfe1616abbdaa100
SHA512
ed572c336e22048e083e99c7ebd24f520d069eb167b972546b0e715e8e8634f17eaf6f0384bdc0633c705a441bc207acdfa40db3769f0f20db237fa02ff3dbdc
SSDEEP
768:N9LsXdnKW4tzYTm/z+pzNTcZrezDsstt5Xs1IqdnwDIoUEWdn:jsXtKZh5/kTctissttCrPoS
Checks for missing Authenticode signature.
resource |
---|
15435325f5b160a3ab9e25ad538727b0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
FreeLibrary
LoadLibraryA
GetModuleFileNameA
CloseHandle
RtlUnwind
FlushFileBuffers
GetStringTypeW
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
HeapSize
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
SetForegroundWindow
PostMessageA
CallWindowProcA
IsWindow
GetWindowThreadProcessId
SetWindowsHookExA
SendMessageA
UnhookWindowsHookEx
SetWindowLongA
SetTimer
KillTimer
CallNextHookEx
RegisterWindowMessageA
VulanHookDll
VulanUnHookDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ