DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
Static task
static1
Behavioral task
behavioral1
Sample
3b4a6078dbef3089c4a103c9203ea7a5.dll
Resource
win7-20231215-en
Target
3b4a6078dbef3089c4a103c9203ea7a5
Size
142KB
MD5
3b4a6078dbef3089c4a103c9203ea7a5
SHA1
f5ba8308e8210c26e52d246d6f9c5c6796dcbeee
SHA256
39bc195ba32d91adfc5ac5a2e7abb95ca626224e23bd0c7567bdbd7dddc86ad8
SHA512
93c490d4be6a8d3784b3db7bd2f6d03133074b609e34431036d30593cfb0da6adf9cb8a46da5ba41686c7e2f5a855d1e26477c7e27d12d4707b848eab25a71ac
SSDEEP
1536:6A2D7/ZT3/Nlq9ireDmy2U4exSVhqZ2dCcN2Zy13SYN6dB5l7mZ0JjUa:a7B32Vk7hm28jyAYN6dB50eJ5
Checks for missing Authenticode signature.
resource |
---|
3b4a6078dbef3089c4a103c9203ea7a5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetCrackUrlA
InternetSetCookieA
InternetGetConnectedState
InternetOpenA
InternetConnectA
HttpOpenRequestA
StrStrIA
PathFileExistsA
wnsprintfA
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetProcAddress
lstrlenA
lstrlenW
GetModuleHandleW
SetThreadLocale
GetThreadLocale
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
HeapReAlloc
HeapAlloc
TerminateThread
GetModuleFileNameA
GetProcessHeap
CloseHandle
LocalFree
LoadLibraryA
GetCurrentProcess
CreateProcessA
WriteFile
CreateFileA
GetTempPathA
lstrcmpA
SleepEx
ReleaseMutex
WaitForSingleObject
CreateMutexA
Sleep
CreateThread
GetVolumeInformationA
GetComputerNameA
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapFree
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
CharNextA
CharNextW
RegCreateKeyA
RegOpenKeyA
LookupAccountNameA
ConvertSidToStringSidA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantClear
VariantInit
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ